Open Access   Article Go Back

New Cryptography Algorithm to Provide Security for Wireless Sensor Network

Satyajeet Shinge1 , S. S. Sambare2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 294-296, May-2015

Online published on May 30, 2015

Copyright © Satyajeet Shinge , S. S. Sambare . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Satyajeet Shinge , S. S. Sambare, “New Cryptography Algorithm to Provide Security for Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.294-296, 2015.

MLA Style Citation: Satyajeet Shinge , S. S. Sambare "New Cryptography Algorithm to Provide Security for Wireless Sensor Network." International Journal of Computer Sciences and Engineering 3.5 (2015): 294-296.

APA Style Citation: Satyajeet Shinge , S. S. Sambare, (2015). New Cryptography Algorithm to Provide Security for Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 3(5), 294-296.

BibTex Style Citation:
@article{Shinge_2015,
author = {Satyajeet Shinge , S. S. Sambare},
title = {New Cryptography Algorithm to Provide Security for Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {294-296},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=521},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=521
TI - New Cryptography Algorithm to Provide Security for Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Satyajeet Shinge , S. S. Sambare
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 294-296
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2380 2293 downloads 2557 downloads
  
  
           

Abstract

Wireless Sensor Network contains tens to hundreds of nodes used to monitor the environment conditions. The data monitor by these nodes is sent to the main location. This data can be humidity, pressure, temperature, density, etc. Current applications of WSN are area monitoring, Health care monitoring, Forest fire detection, Water quality monitoring, battlefield monitoring, etc. Many of these applications can have sensitive data to transfer to the base station. This data can be forged by the adversary during its transfer. Hence security is one issue in Wireless Sensor Network. The recent research shows that the security can be improved using modified cryptographic algorithms in the sensor network. In this paper, we propose one simple cryptographic algorithm using ASCII values of original data. This algorithm can be used to encrypt the sensed data before its transfer.

Key-Words / Index Term

WSN; cryptography; security; ASCII

References

[1] Hasan Tahir and Syed Asim Ali Shah, “Wireless Sensor Networks – A Security Perspective”, Multitopic conference, INMIC 2008, IEEE International, 2008, pp.189-193.
[2] Satyajeet R. Shinge, S. S. Sambare, “ Survey of different Clustering Algorithms used to Increase the Lifetime of Wireless Sensor Networks”, International Journal of Computer Applications, 2014, vol. 108, pp. 15-18.
[3] Hero Modares, Rosli Salleh and Amirhossein Moravejosharieh, “Overview of Security Issues in Wireless Sensor Networks”, Third International Conference on Computational Intelligence, Modelling & Simulation, IEEE 2011, pp.308-311.
[4] Shiva Murthy G, Robert John D’Souza and Golla Varaprasad “Digital Signature-Based Secure Node disjoint Multipath Routing Protocol for Wireless Sensor Networks”, IEEE Sensors Journal, VOL. 12, Issue-10, 2012, pp.2941-2949.
[5] G.Rohini, “Dynamic Router Selection and Encryption for Data Secure in Wireless Sensor Networks, Information Communication and Embedded Systems (ICICES), IEEE 2013 International Conference on , 2006, pp. 256 - 259.
[6] Sangeetha R. and Yuvaraju M. “Secure Energy-Aware Multipath Routing Protocol with Transmission Range Adjustment for Wireless Sensor Networks”, Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on, 2012, pp. 1-4.
[7] Suraj Kumar Sharma and Sanjay Kumar Jena, “SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor Networks,” Sixth International Conference on Wireless Communication and Sensor Networks (WCSN), IEEE 2010, pp. 1-6.
[8] Guiyi Wei and Xueli Wang “Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission,” International Conference on Multimedia Information Networking and Security, IEEE 2010, pp. 496-500.
[9] Aasma Abid, Mukhtar Hussain and Firdous Kausar, “Secure Routing andBroadcast Authentication in Heterogeneous Sensor Networks”, International Conference on Network-Based Information Systems, IEEE 2009, pp. 316-320.
[10] Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong. “Security in Wireless Sensor Networks: Issues and Challenges”, 8th Conference on Advanced Communication Technology, IEEE 2006, pp. 1043-1048.
[11] Akanksha Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, International Journal on Computer Science and Engineering (IJCSE), 2012, Vol. 4, pp. 1650-1657.