New Cryptography Algorithm to Provide Security for Wireless Sensor Network

Authors

  • Shinge S Department of Computer Engineering, Pimpri-Chinchwad College of Engineering, Savitribai Phule Pune University, India.
  • SS Sambare Department of Computer Engineering, Pimpri-Chinchwad College of Engineering, Savitribai Phule Pune University, India.

Keywords:

WSN, cryptography, security, ASCII

Abstract

Wireless Sensor Network contains tens to hundreds of nodes used to monitor the environment conditions. The data monitor by these nodes is sent to the main location. This data can be humidity, pressure, temperature, density, etc. Current applications of WSN are area monitoring, Health care monitoring, Forest fire detection, Water quality monitoring, battlefield monitoring, etc. Many of these applications can have sensitive data to transfer to the base station. This data can be forged by the adversary during its transfer. Hence security is one issue in Wireless Sensor Network. The recent research shows that the security can be improved using modified cryptographic algorithms in the sensor network. In this paper, we propose one simple cryptographic algorithm using ASCII values of original data. This algorithm can be used to encrypt the sensed data before its transfer.

References

Hasan Tahir and Syed Asim Ali Shah, “Wireless Sensor Networks – A Security Perspective”, Multitopic conference, INMIC 2008, IEEE International, 2008, pp.189-193.

Satyajeet R. Shinge, S. S. Sambare, “ Survey of different Clustering Algorithms used to Increase the Lifetime of Wireless Sensor Networks”, International Journal of Computer Applications, 2014, vol. 108, pp. 15-18.

Hero Modares, Rosli Salleh and Amirhossein Moravejosharieh, “Overview of Security Issues in Wireless Sensor Networks”, Third International Conference on Computational Intelligence, Modelling & Simulation, IEEE 2011, pp.308-311.

Shiva Murthy G, Robert John D’Souza and Golla Varaprasad “Digital Signature-Based Secure Node disjoint Multipath Routing Protocol for Wireless Sensor Networks”, IEEE Sensors Journal, VOL. 12, Issue-10, 2012, pp.2941-2949.

G.Rohini, “Dynamic Router Selection and Encryption for Data Secure in Wireless Sensor Networks, Information Communication and Embedded Systems (ICICES), IEEE 2013 International Conference on , 2006, pp. 256 - 259.

Sangeetha R. and Yuvaraju M. “Secure Energy-Aware Multipath Routing Protocol with Transmission Range Adjustment for Wireless Sensor Networks”, Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on, 2012, pp. 1-4.

Suraj Kumar Sharma and Sanjay Kumar Jena, “SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor Networks,” Sixth International Conference on Wireless Communication and Sensor Networks (WCSN), IEEE 2010, pp. 1-6.

Guiyi Wei and Xueli Wang “Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission,” International Conference on Multimedia Information Networking and Security, IEEE 2010, pp. 496-500.

Aasma Abid, Mukhtar Hussain and Firdous Kausar, “Secure Routing andBroadcast Authentication in Heterogeneous Sensor Networks”, International Conference on Network-Based Information Systems, IEEE 2009, pp. 316-320.

Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong. “Security in Wireless Sensor Networks: Issues and Challenges”, 8th Conference on Advanced Communication Technology, IEEE 2006, pp. 1043-1048.

Akanksha Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 1650-1657.

Downloads

Published

2015-05-30

How to Cite

[1]
S. Shinge and S. Sambare, “New Cryptography Algorithm to Provide Security for Wireless Sensor Network”, Int. J. Comp. Sci. Eng., vol. 3, no. 5, pp. 294–296, May 2015.

Issue

Section

Research Article