Open Access   Article Go Back

Analysis Survey and Comparison of Cryptography Algorithms in Wsn

Pooja 1 , R.K.Chauhan 2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1545-1550, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.15451550

Online published on Jun 30, 2018

Copyright © Pooja, R.K.Chauhan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pooja, R.K.Chauhan, “Analysis Survey and Comparison of Cryptography Algorithms in Wsn,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1545-1550, 2018.

MLA Style Citation: Pooja, R.K.Chauhan "Analysis Survey and Comparison of Cryptography Algorithms in Wsn." International Journal of Computer Sciences and Engineering 6.6 (2018): 1545-1550.

APA Style Citation: Pooja, R.K.Chauhan, (2018). Analysis Survey and Comparison of Cryptography Algorithms in Wsn. International Journal of Computer Sciences and Engineering, 6(6), 1545-1550.

BibTex Style Citation:
@article{_2018,
author = {Pooja, R.K.Chauhan},
title = {Analysis Survey and Comparison of Cryptography Algorithms in Wsn},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1545-1550},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2381},
doi = {https://doi.org/10.26438/ijcse/v6i6.15451550}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.15451550}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2381
TI - Analysis Survey and Comparison of Cryptography Algorithms in Wsn
T2 - International Journal of Computer Sciences and Engineering
AU - Pooja, R.K.Chauhan
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1545-1550
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
519 365 downloads 299 downloads
  
  
           

Abstract

Wireless Sensor Networks (WSN) is spreading its root nearly in every field and because of its widespread growth it is vulnerable to many serious attacks. For such reason, security demands increases in WSNs. For achieving high level of security, cryptography plays an important role. Though there exist so many symmetric and asymmetric cryptography algorithms, but they have some drawbacks in terms of key sizes, power consumption, encryption time, etc. in them. So the main objective of this paper is to analyse and compare the asymmetric cryptography algorithm (RSA and ECC) and symmetric cryptography algorithm (AES) with proper implementation. These algorithms are analysed on the basis of total execution time of the algorithm, power & energy consumption and estimated memory requirement for the algorithm.

Key-Words / Index Term

Cryptography, symmetric algorithm, asymmetric algorithms

References

[1] K. A. Shim “A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, 2012.
[2] K. Shankar, P. Eswaran “Sharing a Secret Image with Encapsulated Shares in Visual Cryptography”, 4th International Conference on Eco-friendly Computing and Communication Systems, ICECCS, Elsevier, Procedia Computer Science 70 ( 2015 ) 462 – 468.
[3] H. Fouchal, P. Hunel, C. Ramassamy, “Towards efficient deployment of wireless sensor networks”, Secure Communication Networks, 2014.
[4] T. Hayajneh, R. Doomun, G. Almashaqbeh, B. J. Mohd, “An energy-efficient and security aware route selection protocol for wireless sensor networks”. Secure Communication Networks, 2013
[5] N. Lasla, A. Derhab, A. Ouadjaout, M. Bagaa, Y. Challal, “SMART: secure multi-paths routing for wireless sensor networks”, In: Ad-hoc, Mobile, and Wireless Networks, Lecture Notes in Computer Science, vol. 8487, pp. 332–345, 2014.
[6] F. Farouk, R. Rizk, F. W. Zaki, “Multi-level stable and energy efficient clustering protocol in heterogeneous wireless sensor network”. IET Wireless Sensor System 4 (4), 159–169, 2014.
[7] N. Yu, L. Zhang, Y. Ren, “A novel D–S based secure localization algorithm for wireless sensor networks” Secure. Communication. Networks, 2013.
[8] A. Mary, E.A., Geetha, E. Kannan, “A novel hybrid key management scheme for establishing secure communication in wireless sensor networks”, Wirel. Pers. Commun, 2015.
[9] R. Rawya, A. Yasmin, “Two-phase hybrid cryptography algorithm for wireless sensor networks”, Elsevier, Journal of Electrical Systems and Information Technology 2 (2015) 296–313.
[10] S. Faye, J. F. Myoupo, “Secure and energy-efficient geocast protocols for wireless sensor networks based on a hierarchical clustered structure”, International Journal of Network Security, 15 (1), 121–130, 2013.
[11] F. Amin, A. H. Jahangir, and H. Rasifard, “Analysis of Public-Key Cryptography for Wireless Sensor Networks Security”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:2, No:5, 2008.
[12] R. Masram, V. Shahare, J. Abraham, R. Moona “Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014, DOI: 10.5121/ijnsa.2014.6404 43.
[13] G. S. Quirino, A. R. L. Ribeiro and E. D. Moreno, “Asymmetric Encryption in Wireless Sensor Networks”, Chapter 10, book: Wireless Sensor Networks - Technology and Protocols.
[14] S. P. Singh, and R. Maini, “Comparison Of Data Encryption Algorithms”, International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 125-127.
[15] S. U. Rehman*, M. Bilal**, B. Ahmad**, K. M. Yahya**, A. Ullah**, O. U. Rehman*, “Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012.
[16] A. Faquih, P. Kadam, Z. Saquib, “Cryptographic Techniques for Wireless Sensor Networks: A Survey”, IEEE Bombay Section Symposium (IBSS), 2015.
[17] N. Jirwan, A. Singh, S. Vijay, “Review and Analysis of Cryptography Techniques”, International Journal of Scientific & Engineering Research Volume 4, Issue3, March2013.
[18] R. Bhanot and R. Hans, “A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and Its Applications, Vol. 9, No. 4 (2015), pp. 289-306.
[19] G. D. Evangelidis, E. Z. Psarakis, "Parametric Image Alignment using Enhanced Correlation Coefficient", IEEE Trans. on PAMI, vol.30, no.10, 2008.