Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network
V. Perumal1 , K. Meenakshi Sundaram2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 1271-1276, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.12711276
Online published on May 31, 2019
Copyright © V. Perumal, K. Meenakshi Sundaram . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: V. Perumal, K. Meenakshi Sundaram, “Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1271-1276, 2019.
MLA Style Citation: V. Perumal, K. Meenakshi Sundaram "Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 7.5 (2019): 1271-1276.
APA Style Citation: V. Perumal, K. Meenakshi Sundaram, (2019). Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 7(5), 1271-1276.
BibTex Style Citation:
@article{Perumal_2019,
author = {V. Perumal, K. Meenakshi Sundaram},
title = {Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1271-1276},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4401},
doi = {https://doi.org/10.26438/ijcse/v7i5.12711276}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.12711276}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4401
TI - Cluster Based Secured Data Transmission using Hybrid Cryptography Techniques in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - V. Perumal, K. Meenakshi Sundaram
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1271-1276
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
364 | 261 downloads | 118 downloads |
Abstract
Security in the Wireless Sensor Network plays an important role and can be achieved by cryptographic algorithms. The cryptography is the science and art of transforming messages to make them secure and immune to attacks by authenticating the sender and receiver within the network. The Proposed methodology, hybrid cryptographic technique has combined Blowfish algorithm for symmetric and Elliptic Curve Diffie-Hellman algorithm for asymmetric. Blowfish algorithm provides high speed encryption process when compared with the other symmetric algorithms. The Elliptic Curve Diffie-Hellman algorithm combines the concept of elliptic curve and Diffie-Hellman key exchange algorithm. Hence, it provides more security compared to other asymmetric algorithm and the key exchange mechanism. Cluster based trust Management approaches are used to identify unauthorized user in WSN. It first identifies the trusted nodes in networks, then send packets through that trusted nodes. Trusted nodes are identified based on trust values to identify the neighboring nodes during verification process for improving the Packet Delivery Ratio and Energy Consumption.
Key-Words / Index Term
Sensor node, Elliptic Curve, Blowfish, Diffie-Hellman, Trust Node Calculation, WSN
References
[1]. Asha Rani Mishra, Mahesh Singh “Elliptic Curve Cryptography (ECC) For Security in Wireless sensor Network” International Journal of Engineering Research and Technology (IJERT), vol-1,Issue-3,may-2012.
[2]. Madhumita Panda “Security in Wireless Sensor Networks using Cryptographic Techniques” American Journal of Engineering Research (AJER) , Volume-03, Issue-01, pp(50-56)-2014.
[3]. kamulu Deepthi, Krishnachaitanya,.Katkam “Wireless Sensor Networks Security Survey Using Cryptography” International Journal Of Emerging Trends & Technology In Computer Science (IJETTCS), Volume 5, Issue 5, September - October 2016.
[4]. Mohamed Elhoseny , Hamdy Elminir , Alaa Riad , Xiaohui Yuan “A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption” Journal of King Saud University – Computer and Information Sciences, pp( 262–275), ELSEVIER-2016.
[5]. Abdullah Smadi, Hesham Enshasy, Qasem Abu Al-Haija “Estimating Energy Consumption of Diffie-Hellman Encrypted Key Exchange (DH-EKE) for Wireless Sensor Network” International Conference On Intelligent Techniques In Control, Optimization And Signal Processing, IEEE-2017.
[6]. Preetika Joshi, Manju verma, Pushpendra R Verma “Secure Authentication Approach Using DiffieHellman Key
Exchange Algorithm for WSN” International Conference on Control,Instrumentation, Communication and
Computational Technologies (lCCICCT), IEEE-2015.
[7].Chaitali Haldankar, Sonia Kuwelkar “IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM” International Journal of Research in Engineering and Technology (IJRET) , Volume-3 Special Issue-3,May- 2014 .
[8].Shamina Ross.B, Josephraj.V “ Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique” International Journal of Applied Engineering Research(IJAER) , Volume 12, pp( 9236-9244) – 2017.
[9].Rajat Soni, Deepak Sethi, Partha Pratim Bhattacharaya “ ANALYSIS OF VARIOUS CRYPTOGRAPHIC ALGORITHMS FOR SECURITY IN WIRELESS SENSOR NETWORKS” International Journal For Advance Research In Engineering And Technology(IJARE), Volume-4, Issue-V, May-2016.
[10]. Juan Li “A Symmetric Cryptography Algorithm in Wireless Sensor Network Security” International journal of
online Engineering ((iJOE) ‒ Vol 13,2017.
[11]. Huang Lu, Jie Li, Mohsen Guizani “Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM - 2013.
[12]. Thiruppathy Kesavan Venkatasam, Radhakrishnan Shanmugasundaram “ Authentication in Wireless Sensor Networks Using Dynamic Keying Technique” International Journal of Intelligent Engineering and Systems (IJIES), Vol.9, No.3, 2016.
[13]. Usha.A, Dr.Subramani.A “Performance Study of Key Developer Data Encryption and Decryption Algorithm (KDDEDA) with AES, DES and BLOWFISH” International Journal Of Engineering And Computer Science (IJEC), Volume 5, Issue 12, Pp( 19596-19611), Dec- 2016