Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks

Authors

  • H Kaur Computer Science Engineering, Patiala Institute of Engineering and Technology for Women, Maharaja Ranjit Singh Punjab Technical University, Patiala, India
  • K Kaur Computer Science Engineering, Patiala Institute of Engineering and Technology for Women, Maharaja Ranjit Singh Punjab Technical University, Patiala, India

DOI:

https://doi.org/10.26438/ijcse/v6i8.102105

Keywords:

Cryptography, Wireless SensorNetwork, Attacks, AES, RSA

Abstract

Wireless sensor network are autonomous nodes which monitor and communicate the sensor data to central unit through wireless network. There devices are installed in the remote areas and used for communicate sensitive information in different application such as smart grids, MANET. The attackers attack on these nodes to extract information or modify. In this paper, various attacks and its countermeasure technique such as cryptography algorithms are studied and comparative analysis is done for the wireless sensor network. From, the analysis found that symmetric and asymmetric ciphers are hybrid which provide authentication and confidentiality but increased the resources requirement. But, the wireless sensor nodes are battery operated and low memory available. Therefore, we recommend in the future work preferred lightweight cipher and different modes of authentication such as CCM, counter mode to enhance the performance on wireless sensor network.

References

[1] Cheikhrouhou, Omar, "Secure group communication in wireless sensor networks: a survey," Journal of Network and Computer Applications, vol. 61, pp. 115-132, 2016.

[2] Pawar, M., & Agarwal, J.,“A literature survey on security issues of WSN and different types of attacks in network," Indian Journal of Computer Science and Engineering, vol. 8, issue 2, pp. 80-83, 2017.

[3] Faquih, A., Kadam, P., &Saquib, Z.,.“Cryptographic techniques for wireless sensor networks: A survey,” In Bombay Section Symposium (IBSS),pp. 1-6, 2015.

[4] Parrilla, L., Castillo, E., López-Ramos, J. A., Álvarez-Bermejo, J. A., García, A., & Morales, D. P. “Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks,” Sensors, vol. 18, issue 1,pp. 251, 2018.

[5] Bisht, N., Thomas, J., &Thanikaiselvan, V. “Implementation of security algorithm for wireless sensor networks over multimedia images,” International Conference onin Communication and Electronics Systems (ICCES), ,pp. 1-6, 2016.

[6] Prathamesh, G., Sanket, G., Yogeshwar, K., & Aniket, N..“Secure Data Transmission in WSN Using 3 DES with Honey Encryption,” IJARIIE, vol.1, issue 4, pp.455-461, 2015.

[7] Panait, C., & Dragomir, D.,“Measuring the performance and energy consumption of AES in wireless sensor networks,”2015 Federated Conference onin Computer Science and Information Systems (FedCSIS), ,pp. 1261-1266, 2015.

[8] Priyadharshini, S. P., Arumuagam, N., &SangeethaAnanthamani, K. “Implementation of Security in Wireless Sensor Network using Blowfish Algorithm,”International Journal of Computer Applications, pp. 33-37, 2014.

[9] Kumar, K. J., Reddy, K. C. K., Salivahanan, S., Karthik, S. D., & Praveen, V.,“Exclusive-128 Bit NLFSR Stream Cipher for Wireless Sensor Network Applications,” International Journal of Engineering and Technology, vol. 5, issue 5, pp. 3668-3675, 2013.

[10] Akishita, T., &Hiwatari, H. “Very compact hardware implementations of the blockcipher CLEFIA,” In International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, pp. 278-292, 2011.

[11] Abduvaliev, A., Lee, S., & Lee, Y. K..“Simple hash based message authentication scheme for wireless sensor networks,”In 9th International Symposium on Communications and Information Technology,(ISCIT), Icheon, pp. 982-986, 2009.

[12] Sreevidya, B., Rajesh, M., & Mamatha, T. M..“Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks,” In Ambient Communications and Computer Systems, pp. 225-236, 2018.

[13] Verma, D., Jain, R., & Shrivastava, A. “Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks,” IUP Journal of Telecommunications, vol. 7, issue 3, pp. 51, 2015.

[14] Eldefrawy, M. H., Khan, M. K., Alghathbar, K., & Cho, E. S. “Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem,”. Sensors,vol. 10, issue 9, pp.8683-8695, 2010

[15] Liu, Z., Wenger, E., &Großschädl, J. “MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks,” In International Conference on Applied Cryptography and Network Security, pp. 361-379, 2014.

[16] Rizk, R., &Alkady, Y. “Two-phase hybrid cryptography algorithm for wireless sensor networks,” Journal of Electrical Systems and Information Technology, vol. 2, issue 3, pp. 296-313, 2015.

[17] Murugan, M. S., Sasilatha, T., & Dean, A. M. E. T. “Design of Hybrid Model Cryptographic Algorithm for Wireless Sensor Network,”International Journal of Pure and Applied Mathematics, vol. 117, pp.171-177, 2017.

[18] Sharmila, R., & Vijayalakshmi, V.,“Hybrid Key Management Scheme for Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 9, issue 11, pp. 125-132, 2015.

[19] Hwang, T., &Gope, P.,“Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network,” Security and Communication Networks, vol. 9, issue 7, pp. 667-679, 2016.

Downloads

Published

2018-08-31
CITATION
DOI: 10.26438/ijcse/v6i8.102105
Published: 2018-08-31

How to Cite

[1]
H. Kaur and K. Kaur, “Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 102–105, Aug. 2018.

Issue

Section

Review Article