IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 6, June 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Performance Comparison of Various Cryptographic Algorithms Along with Energy Consumption in Wireless Sensor Network

[Full Text]

 

AUTHOR(S)

Vivek Parashar,Bharat Mishra

 

KEYWORDS

WSN, Routing Protocols, Security, Cryptographic Algorithms, Energy consumption

 

ABSTRACT

Wireless sensor network (WSN), is an assortment of sensor nodes placed in vicinity to each other which may result in higher communication leads to the failure of nodes. They can overcome node failure through easy exploiting another routing path. Energy utilization is one of the prominent issues in WSN to maintain the lifetime of the network. Entire network life span is depending on proficient energy exploitation in the sensor network. In this paper, the challenges, limitations, and characteristics of WSN have been discussed. There are various cryptographic algorithms available to surpass the safety of the network by the detailed analysis of the algorithms, the encryption, and decryption of the different algorithms has been taken into consideration. The nodes are placed in a manner so that transmission can be performed securely over the network. The results have shown that the data sent securely from the source to the Base Station. We have used a MATLAB simulator to differentiate the various algorithms. The certain parameters are shown in this paper such as energy and packet sent to the Base Station.

 

REFERENCES

[1] Gogu, A., Nace, D., Dilo, A., & Meratnia, N. (2011). Optimization problems in wireless sensor networks. In Proceedings of the international conference on complex intelligent and software intensive systems (pp. 302–309)
[2] Qi Li, Zongwu Ke , Duanfeng Xia & Sun Yuxia (2013), A Routing Protocol for Wireless Sensor Networks with Congestion Control,Communications and Network, ISSN: 1949-2421 2013, 5, 156-160
[3] Yong-Min, L., Shu-Ci, W. & Xiao-Hong, N.(2009) The architecture and characteristics of wireless sensor networks, IEEE International Conference on Computer Technology and Development.. Kota Kinabalu, Malaysia; :561–565.
[4] Björnemo,E.(2009), Energy constrained wireless sensor networks: Communication principles and sensing aspects, Dept. Eng. Sci., Uppsala Univ.
[5] Clouqueur Thomas ,Phipatanasuphorn Veradej ,Ramanathan Parameswaran & Saluja K. Kewal (September 28, 2002) , Sensor deployment strategy for target detection, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, Atlanta, Georgia, USA.
[6] Gupta, S. K. & Sinha, P.(2004), Overview of Wireless Sensor Network: A Survey, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 1.
[7] Basagni, S., Carosi, A., and Petrioli, C. (2008). Mobility in wireless sensor networks. In Algorithms and Protocols for Wireless Sensor Networks, A. Boukerche, Ed. Wiley Series on Parallel and Distributed Computing. John Wiley & Sons, Inc., Hoboken, NJ, Chapter 10, 267--305.
[8] Halil, Y., Kent, T. Kan, C., & Mohammed, E., (2017), “A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, 19(2):828 – 854.
[9] El Brak, I. S.(2012), wireless sensor network in home automation network and smart grid,Complex Systems , International Conference on computational Science (5-6 Nov. 2012) 1-6.
[10] Chen, M.,Gonzalez, S.,Vasilakos, A. and Cao, H.; Leung, V.C.M.(2010), Body Area Networks: A Survey. Mob. Netw. Appl. , 16, 171–193
[11] Durisic, M. P., Tafa, Z., Dimic G. and Milutinovic V(2012), A survey of military applications of wireless sensor networks, Proc. MECO, pp. 196-199.
[12] Arampatzis, T., Lygeros, J. & Manesis, S.(June 2005), A Survey of Applications of Wireless Sensors and Wireless Sensor Networks, 13th Mediterranean Conference on Control and Automation Limassol.
[13] Kassim, M.R.M, & Harun, A.N. (2016), Applications of WSN in agricltural environment monitoring systems, International Conference on Information and Communication Technology Convergence (ICTC), pp. 344-349, 2016.
[14] Singla,A., & Sachdeva, R.(2013).,Review on security issues and attacks in wireless sensor networks, international Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, pp. 529–534.
[15] Yelong Shen,Ning Xi,Qinigqi Pei,Jinafeng MA,Qijian XU & Zuoshun Wu (2011), Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks,Seventh International Conference on CIS,sanya,Hainan.China,pp 545-549.
[16] Redwan, H. & Kim, K. H.(Nov 2008), Survey of security requirements, attacks and network integration in wireless mesh networks, in New Technologies, Mobility and Security, NTMS '08. , pp. 1-5.
[17] Cui, J., Shao, L., Zhong, H. et al (2017).Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks,Peer-to-Peer Netw. Appl.,springer US, 1936-6442.
[18] Patil, S., D. V. K. B. P, Singha, S. and Jamil, R. (2012). A Survey on Authentication Techniques for Wireless Sensor Networks, International Journal of Applied Engineering Research, vol. 7.
[19] Li,J., Andrew,L.H., Foh,C.H., Zukerman,M., Chen,H.H.(2009),Connectivity coverage and placement in wireless sensor networks, Sensors, vol. 9, no. 10, pp. 7664-7693.
[20] Kang, K. D., Son, S. H., and Stankovic, J. A. (2004). Managing deadline miss ratio and sensor data freshness in real databases. IEEE Transactions on Knowledge and Data Engineering 16(10): 1200–1216.
[21] Lasassmeh, S.M.& Conrad, J.M.(2010), Time synchronization in wireless sensor networks: A survey. Proceedings of IEEE SoutheastCon , Concord, NC, USA, 18–21 March 2010; pp. 242–245.
[22] Apkun, S.,Rasmussen, K. & Ajali, M.(2008) ,Secure Location Varification with Hidden and Mobile Base Station,IEEE Trans.Mobile Computing,Vol 4,pp 470-483.
[23] Pesch, D.(2017), Communication protocols for wireless sensor networks, Presented Slides in 3-Workshop on RF Wireless Sensor Networks Research in Ireland, Dublin, Ireland.
[24] Al-Karaki, J.N. & Kamal, A.E.(2004) , Routing techniques in wireless sensor networks: a survey, IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28.
[25] Rong Du, Carlo Fischione, Ming Xiao (2017),Joint Node Deployment and Wireless Energy Transfer Scheduling for Immortal Sensor Networks,15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[26] Deif,D.S and Gadallah,Y(2017). ,An ant colony optimization approach for the deployment of reliable wireless sensor networks, IEEE Access, vol. 5, pp. 10744–10756.
[27] Gudivada, R.B., and Hansdah, R.C.(2018), Energy Efficient Secure Communication in Wireless Sensor Networks, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, 2018, pp. 311-319.
[28] Kyoungsoo Bok, Yunjeong Lee, Junho Park, and Jaesoo Yoo, “An Energy-Efficient Secure Scheme in Wireless Sensor Networks,” Journal of Sensors, vol. 2016, Article ID 1321079, 11 pages, 2016.
[29] Lin, Y., Zhang, J., Chung, H.S.-H.,Ip,W. H.,Li,Y. & Shi,Y.H., (2012), An ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks, IEEE Trans. Syst. Man Cybern. C Appl. Rev., vol. 42, no. 3,pp. 408-420.
[30] Jiaying Duan,Tianyun Shi, Lv Xiaojun & Li Zhi(2016), Optimal Node Deployment Scheme for WSN- Based Railway Environment Monitoring System, The review process for the 28th Chinese Control and Decision Conference.
[31] Postigo-Malaga, M., Supo-Colquehuanca, E., Matta-Hernandez, J., Pari Lizardo , Efra´ın Mayhua-Lopez(2016) ,Vehicle Location System and Monitoring as a Tool for Citizen Safety Using Wireless Sensor Network, IEEE ANDESCON, pp 1-4.
[32] Wei, D., Jin,Y., Vural,S. & Moessner, K.(Nov 2011), An Energy-Effcient Clustering Solution for Wireless Sensor Networks," IEEE Trans. on Wireless Comm., vol. 10, no. 11, pp. 3973-3983.
[33] Zhang, W., Das, S. K., Liu, Y,Security in Wireless Sensor Networks: A Survey,in Y.Xiao (2007),Security in Sensor Networks, Auerbach Pubilication ,pp 237-272.
[34] Kaur Veerpal & Singh Aman(2013), Review of Various Algorithms Used in Hybrid Cryptography International Journal of Computer Science and Network, Volume 2, Issue 6.
[35] Dhillon, J. ,Prasad, K., Kumar, R. and Gill,A(2011),Secure Data in Wireless Sensor Network By Using DES,International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 3.
[36] Kaur, A.(2013),Energy Analysis of Wireless Sensor Networks using RSA and ECC Encryption Method, International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 2212 ISSN 2229-5518 IJSER .
[37] Zhao, G.,Yang, X.,Zhou, B. and Wei,W.(2010), RSA-based digital image encryption algorithm in wireless sensor networks, 2nd IEEE International Conference on Signal Processing Systems (ICSPS).
[38] Lee, H., Lee, K., and Shin, Y.(2010), Implementation and Performance Analysis of AES-128 CBC algorithm in WSNs, in 12th International Conference on Advanced Communication Technology, pp. 243-248.
[39] Shanyue, B. & Liqing, C.(2012), A new key management protocol for wireless sensor network, " in International Conference on Computer Science Service System (CSSS), pp. 991-994.