Author : K.Sethu Selvam 1
Date of Publication :31st December 2017
Abstract: Wireless sensor network (WSN) is a collection of a sensor which is deployed remotely to sense the complicated area. It is used in various fields like military surveillance, disaster management and etc. Security is the most vital in the network. Cryptography plays an important role in network security. The traditional cryptographic technique can’t be applied to wireless sensor network because of its resource limitation. The proposed model is a hybrid cryptography which is a combination of both symmetric and asymmetric cryptographic techniques. The key is generated with the help of ECC and securely transmitted through ECDH protocol. Confidentiality of data is done through AES, Blowfish and ECC. Hashing technique MD5 is used for Integrity of data. It provides high security in an efficient manner. It requires less memory, energy and computation time.
Reference :
-
- Abdul.Elminaam D. S., H. M. Abdul kader, M. M. Hadhoud, ”Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms”, International Journal of Computer Theory and Engineering ( IJCTE),VOL.1 No.3, pp: 342- 350, August 2009. (ISSN: 1793-821X).
- Abdul.Elminaam D. S., H. M. Abdul kader, M. M. Hadhoud." Evaluating the Performance of Symmetric Encryption Algorithms ".International Journal of Network Security ( IJNS), VOL.10 No.3, pp: 216- 222, May 2010.
- Ahmed Al-Riyami, Ning Zhang, And John Keane, “An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs”, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011,978-1-4577-0590-8/11/$26.00 ©2011 IEEE MIT, Anna University, Chennai. June 3-5, 2011
- Al-alak S., Z. Ahmed, A. Abdullah and S. Subramiam," AES and ECC Mixed for ZigBee Wireless Sensor Security", World Academy of Science, Engineering and Technology, 2011
- Dawahdeh Z, Yaakob N.S., “A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem”, Journal of Theoretical and Applied Information Technology, Vol.85, pp. 290-297 (2016).
- Dubal M. J., T. R. Mahesh, and P. A. Ghosh, "Design of a new security protocol using hybrid cryptography architecture," In Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT), vol. 5, 2011.
- Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed, Diaa Salama AbdElminaam, “Performance Evaluation Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing”, International Journal Of Technology Enhancements And Emerging Engineering Research, VOL 2, Issue 4 63 ISSN 2347-4289