New Cryptography Algorithm to Provide Security for Wireless Sensor Network
Satyajeet Shinge1 , S. S. Sambare2
Section:Research Paper, Product Type: Journal Paper
Volume-3 ,
Issue-5 , Page no. 294-296, May-2015
Online published on May 30, 2015
Copyright © Satyajeet Shinge , S. S. Sambare . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Satyajeet Shinge , S. S. Sambare, “New Cryptography Algorithm to Provide Security for Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.294-296, 2015.
MLA Style Citation: Satyajeet Shinge , S. S. Sambare "New Cryptography Algorithm to Provide Security for Wireless Sensor Network." International Journal of Computer Sciences and Engineering 3.5 (2015): 294-296.
APA Style Citation: Satyajeet Shinge , S. S. Sambare, (2015). New Cryptography Algorithm to Provide Security for Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 3(5), 294-296.
BibTex Style Citation:
@article{Shinge_2015,
author = {Satyajeet Shinge , S. S. Sambare},
title = {New Cryptography Algorithm to Provide Security for Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {294-296},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=521},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=521
TI - New Cryptography Algorithm to Provide Security for Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Satyajeet Shinge , S. S. Sambare
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 294-296
IS - 5
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2380 | 2293 downloads | 2557 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
Wireless Sensor Network contains tens to hundreds of nodes used to monitor the environment conditions. The data monitor by these nodes is sent to the main location. This data can be humidity, pressure, temperature, density, etc. Current applications of WSN are area monitoring, Health care monitoring, Forest fire detection, Water quality monitoring, battlefield monitoring, etc. Many of these applications can have sensitive data to transfer to the base station. This data can be forged by the adversary during its transfer. Hence security is one issue in Wireless Sensor Network. The recent research shows that the security can be improved using modified cryptographic algorithms in the sensor network. In this paper, we propose one simple cryptographic algorithm using ASCII values of original data. This algorithm can be used to encrypt the sensed data before its transfer.
Key-Words / Index Term
WSN; cryptography; security; ASCII
References
[1] Hasan Tahir and Syed Asim Ali Shah, “Wireless Sensor Networks – A Security Perspective”, Multitopic conference, INMIC 2008, IEEE International, 2008, pp.189-193.
[2] Satyajeet R. Shinge, S. S. Sambare, “ Survey of different Clustering Algorithms used to Increase the Lifetime of Wireless Sensor Networks”, International Journal of Computer Applications, 2014, vol. 108, pp. 15-18.
[3] Hero Modares, Rosli Salleh and Amirhossein Moravejosharieh, “Overview of Security Issues in Wireless Sensor Networks”, Third International Conference on Computational Intelligence, Modelling & Simulation, IEEE 2011, pp.308-311.
[4] Shiva Murthy G, Robert John D’Souza and Golla Varaprasad “Digital Signature-Based Secure Node disjoint Multipath Routing Protocol for Wireless Sensor Networks”, IEEE Sensors Journal, VOL. 12, Issue-10, 2012, pp.2941-2949.
[5] G.Rohini, “Dynamic Router Selection and Encryption for Data Secure in Wireless Sensor Networks, Information Communication and Embedded Systems (ICICES), IEEE 2013 International Conference on , 2006, pp. 256 - 259.
[6] Sangeetha R. and Yuvaraju M. “Secure Energy-Aware Multipath Routing Protocol with Transmission Range Adjustment for Wireless Sensor Networks”, Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on, 2012, pp. 1-4.
[7] Suraj Kumar Sharma and Sanjay Kumar Jena, “SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor Networks,” Sixth International Conference on Wireless Communication and Sensor Networks (WCSN), IEEE 2010, pp. 1-6.
[8] Guiyi Wei and Xueli Wang “Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission,” International Conference on Multimedia Information Networking and Security, IEEE 2010, pp. 496-500.
[9] Aasma Abid, Mukhtar Hussain and Firdous Kausar, “Secure Routing andBroadcast Authentication in Heterogeneous Sensor Networks”, International Conference on Network-Based Information Systems, IEEE 2009, pp. 316-320.
[10] Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong. “Security in Wireless Sensor Networks: Issues and Challenges”, 8th Conference on Advanced Communication Technology, IEEE 2006, pp. 1043-1048.
[11] Akanksha Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 1650-1657.