Open Access   Article Go Back

Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks

H. Kaur1 , K. Kaur2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 102-105, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.102105

Online published on Aug 31, 2018

Copyright © H. Kaur, K. Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: H. Kaur, K. Kaur, “Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.102-105, 2018.

MLA Style Citation: H. Kaur, K. Kaur "Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 6.8 (2018): 102-105.

APA Style Citation: H. Kaur, K. Kaur, (2018). Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 6(8), 102-105.

BibTex Style Citation:
@article{Kaur_2018,
author = {H. Kaur, K. Kaur},
title = {Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {102-105},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2662},
doi = {https://doi.org/10.26438/ijcse/v6i8.102105}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.102105}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2662
TI - Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - H. Kaur, K. Kaur
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 102-105
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
515 347 downloads 249 downloads
  
  
           

Abstract

Wireless sensor network are autonomous nodes which monitor and communicate the sensor data to central unit through wireless network. There devices are installed in the remote areas and used for communicate sensitive information in different application such as smart grids, MANET. The attackers attack on these nodes to extract information or modify. In this paper, various attacks and its countermeasure technique such as cryptography algorithms are studied and comparative analysis is done for the wireless sensor network. From, the analysis found that symmetric and asymmetric ciphers are hybrid which provide authentication and confidentiality but increased the resources requirement. But, the wireless sensor nodes are battery operated and low memory available. Therefore, we recommend in the future work preferred lightweight cipher and different modes of authentication such as CCM, counter mode to enhance the performance on wireless sensor network.

Key-Words / Index Term

Cryptography, Wireless SensorNetwork,Attacks,AES,RSA

References

[1] Cheikhrouhou, Omar, "Secure group communication in wireless sensor networks: a survey," Journal of Network and Computer Applications, vol. 61, pp. 115-132, 2016.
[2] Pawar, M., & Agarwal, J.,“A literature survey on security issues of WSN and different types of attacks in network," Indian Journal of Computer Science and Engineering, vol. 8, issue 2, pp. 80-83, 2017.
[3] Faquih, A., Kadam, P., &Saquib, Z.,.“Cryptographic techniques for wireless sensor networks: A survey,” In Bombay Section Symposium (IBSS),pp. 1-6, 2015.
[4] Parrilla, L., Castillo, E., López-Ramos, J. A., Álvarez-Bermejo, J. A., García, A., & Morales, D. P. “Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks,” Sensors, vol. 18, issue 1,pp. 251, 2018.
[5] Bisht, N., Thomas, J., &Thanikaiselvan, V. “Implementation of security algorithm for wireless sensor networks over multimedia images,” International Conference onin Communication and Electronics Systems (ICCES), ,pp. 1-6, 2016.
[6] Prathamesh, G., Sanket, G., Yogeshwar, K., & Aniket, N..“Secure Data Transmission in WSN Using 3 DES with Honey Encryption,” IJARIIE, vol.1, issue 4, pp.455-461, 2015.
[7] Panait, C., & Dragomir, D.,“Measuring the performance and energy consumption of AES in wireless sensor networks,”2015 Federated Conference onin Computer Science and Information Systems (FedCSIS), ,pp. 1261-1266, 2015.
[8] Priyadharshini, S. P., Arumuagam, N., &SangeethaAnanthamani, K. “Implementation of Security in Wireless Sensor Network using Blowfish Algorithm,”International Journal of Computer Applications, pp. 33-37, 2014.
[9] Kumar, K. J., Reddy, K. C. K., Salivahanan, S., Karthik, S. D., & Praveen, V.,“Exclusive-128 Bit NLFSR Stream Cipher for Wireless Sensor Network Applications,” International Journal of Engineering and Technology, vol. 5, issue 5, pp. 3668-3675, 2013.
[10] Akishita, T., &Hiwatari, H. “Very compact hardware implementations of the blockcipher CLEFIA,” In International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, pp. 278-292, 2011.
[11] Abduvaliev, A., Lee, S., & Lee, Y. K..“Simple hash based message authentication scheme for wireless sensor networks,”In 9th International Symposium on Communications and Information Technology,(ISCIT), Icheon, pp. 982-986, 2009.
[12] Sreevidya, B., Rajesh, M., & Mamatha, T. M..“Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks,” In Ambient Communications and Computer Systems, pp. 225-236, 2018.
[13] Verma, D., Jain, R., & Shrivastava, A. “Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks,” IUP Journal of Telecommunications, vol. 7, issue 3, pp. 51, 2015.
[14] Eldefrawy, M. H., Khan, M. K., Alghathbar, K., & Cho, E. S. “Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem,”. Sensors,vol. 10, issue 9, pp.8683-8695, 2010
[15] Liu, Z., Wenger, E., &Großschädl, J. “MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks,” In International Conference on Applied Cryptography and Network Security, pp. 361-379, 2014.
[16] Rizk, R., &Alkady, Y. “Two-phase hybrid cryptography algorithm for wireless sensor networks,” Journal of Electrical Systems and Information Technology, vol. 2, issue 3, pp. 296-313, 2015.
[17] Murugan, M. S., Sasilatha, T., & Dean, A. M. E. T. “Design of Hybrid Model Cryptographic Algorithm for Wireless Sensor Network,”International Journal of Pure and Applied Mathematics, vol. 117, pp.171-177, 2017.
[18] Sharmila, R., & Vijayalakshmi, V.,“Hybrid Key Management Scheme for Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 9, issue 11, pp. 125-132, 2015.
[19] Hwang, T., &Gope, P.,“Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network,” Security and Communication Networks, vol. 9, issue 7, pp. 667-679, 2016.