Sensor Data Encryption Protocol for Wireless Network Security

α
Dr. Bharat Singh
Dr. Bharat Singh
σ
Parvinder Singh
Parvinder Singh
ρ
Dr. V.S. Dhaka
Dr. V.S. Dhaka
α Central University of Rajasthan

Send Message

To: Author

Sensor Data Encryption Protocol for Wireless Network Security

Article Fingerprint

ReserarchID

2R8T2

Sensor Data Encryption Protocol for Wireless Network Security Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Wireless Sensor Network consisting of a large number of sensor nodes that connected through wireless media has emerged as a ground breaking technology that offers unprecedented ability to monitor the physical word accurately. The privacy preservation is an important issue in wireless sensor network. Developing effective security solutions for wireless sensor networks are not easy due to limited resources. In this paper we propose new techniques for the purpose of security in wireless sensor network called as SDEP sensor data encryption protocol. In the scheme we use the RC 6 method for the purpose of encryption and decryption. RC 6 provide best confusion and diffusion properties with the less computational overhead. In order to confirm effectiveness of SDEP, a comparative performance evaluation with AES and RC 5 algorithms are presented in terms of memory requirement and execution time criteria. Our proposed scheme provides better performance than AES and RC 5 in the term of execution time and total memory requirement. We also provide simulation results for proposed method in the term of overhead and energy according to this result SDEP is strong block cipher for wireless sensor networks.

References

11 Cites in Article
  1. R Rivest (1995). The RC5 Encryption Algorithm.
  2. Chris Karlof,Naveen Sastry,David Wagner (2004). TinySec.
  3. B Kadri,A Mhamed,M Feham (2007). Secured Clustering Algorithm For Mobile Ad Hoc Networks.
  4. J Albath,S Madria (2007). Practical Algorithm for Data Security (PADS) in Wireless Sensor Networks.
  5. Koo Woo,K Lee,H,Kim Yong,H,Lee Dong,H (2008). Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks, Information Security and Assurance.
  6. A Perrig,R Szewczyk,V Wen,D Culler,J Tygar (2002). SPINS: Security Protocols for Sensor Networks.
  7. Prasanth Ganesan,Ramnath Venugopalan,Pushkin Peddabachagari,Alexander Dean,Frank Mueller,Mihail Sichitiu (2003). Analyzing and modeling encryption overhead for sensor network nodes.
  8. Pawan Kumar Goel,Vinit Sharma (2011). Unknown Title.
  9. Sencun Zhu,Sanjeev Setia,Sushil Jajodia (2003). LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks.
  10. Sun-Min Hwang,Eui-Nam Huh (2009). An Efficient Topology Control and Dynamic Interval Scheduling Scheme for 6LoWPAN.
  11. Guoqiang Anushiya A Kannan,Branka Mao,Vucetic (2006). Simulated Annealing based Wireless Sensor Network Localization.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. Bharat Singh. 1970. \u201cSensor Data Encryption Protocol for Wireless Network Security\u201d. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 9): .

Download Citation

Journal Specifications
Version of record

v1.2

Issue date

May 2, 2012

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 20662
Total Downloads: 10751
2026 Trends
Related Research

Published Article

Wireless Sensor Network consisting of a large number of sensor nodes that connected through wireless media has emerged as a ground breaking technology that offers unprecedented ability to monitor the physical word accurately. The privacy preservation is an important issue in wireless sensor network. Developing effective security solutions for wireless sensor networks are not easy due to limited resources. In this paper we propose new techniques for the purpose of security in wireless sensor network called as SDEP sensor data encryption protocol. In the scheme we use the RC 6 method for the purpose of encryption and decryption. RC 6 provide best confusion and diffusion properties with the less computational overhead. In order to confirm effectiveness of SDEP, a comparative performance evaluation with AES and RC 5 algorithms are presented in terms of memory requirement and execution time criteria. Our proposed scheme provides better performance than AES and RC 5 in the term of execution time and total memory requirement. We also provide simulation results for proposed method in the term of overhead and energy according to this result SDEP is strong block cipher for wireless sensor networks.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Sensor Data Encryption Protocol for Wireless Network Security

Dr. Bharat Singh
Dr. Bharat Singh Central University of Rajasthan
Parvinder Singh
Parvinder Singh
Dr. V.S. Dhaka
Dr. V.S. Dhaka

Research Journals