Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach
الموضوعات :Omid Mahdi Ebadati 1 , Farshad Eshghi 2 , Amin Zamani 3
1 - Kharazmi University
2 - Kharazmi University
3 - Kharazmi University
الکلمات المفتاحية: Wireless sensor network , Cryptography algorithm , Hybrid cryptography , Confidentiality , Integration , Authentication,
ملخص المقالة :
Wireless sensor networks are new technologies that are used for various purposes such as environmental monitoring, home security, industrial process monitoring, healthcare programs and etc. Wireless sensor networks are vulnerable to various attacks. Cryptography is one of the methods for secure transmission of information between sensors in wireless sensor networks. A complete and secure encryption system must establish three principles of confidentiality, authentication and integrity. An encryption algorithm alone cannot provide all the principles of encryption. A hybrid encryption algorithm, consisting of symmetric and asymmetric encryption algorithms, provides complete security for a cryptographic system. The papers presented in this area over the last few years, and a new secure algorithm present with regard to the limitations of wireless sensor networks, which establishes three principles of cryptography. The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational and showed a very high efficiency in compare to the current proposed methods.
[1] Panda, M. (January 2014). Security in Wireless Sensor Networks using Cryptographic Techniques. American Journal of Engineering Research (AJER), 3(1), 7.
[2] Shenoy, P. D., Iyengar, S. S., Raja, K. B., K R, V., Buyya, R., Patnaik, L. M., . . . Singh, K. M. (2015b). Eleventh International Conference on Communication Networks, ICCN 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Data Mining and Warehousing, ICDMW 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Image and Signal Processing, ICISP 2015, August 21-23, 2015, Bangalore, India. Implementation of Text Encryption using Elliptic Curve Cryptography. Procedia Computer Science, 54, 73-82.
[3] Shenoy, P. D., Iyengar, S. S., Raja, K. B., K R, V., Buyya, R., Patnaik, L. M., Singh, K. M. (2015a). Eleventh International Conference on Communication Networks, ICCN 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Data Mining and Warehousing, ICDMW 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Image and Signal Processing, ICISP 2015, August 21-23, 2015, Bangalore, India. Image Encryption using Elliptic Curve Cryptography. Procedia Computer Science, 54, 472-481.
[4] Gaurav R. Patel, Prof. Krunal Panchal. Hybrid Encryption Algorithm, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Vol.2, Issue 2, pp.2064-2070, June 2014.
[5] Akshaya.P, M. S. a. (2014). Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concept. International Journal of Network Security & Its Applications, 6(6), 10.
[6] Zhu, S. h. (2011, 9-11 Sept. 2011). Research of hybrid cipher algorithm application to hydraulic information transmission. Paper presented at the Electronics, Communications and Control (ICECC), 2011 International Conference on.
[7] K. Brindha, G. R., Rajpal Amit Jayantila. (2013). Secured Data Transfer in Wireless Networks Using Hybrid Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), 3.
[8] Patnaik, S., Singh, R., Panchbhaiya, I., Pandey, A., & Goudar, R. H. (2015). International Conference on Computer, Communication and Convergence (ICCC 2015) Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet. Procedia Computer Science, 48, 51-57.
[9] Prakash Kuppuswamy, S. Q. Y. A. K. (2014). Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm. International Journal of Information and Computer Security, 19(2), 14. doi: 10.6131/MISR.2014.1902.01.
[10] Sakthivel, S. S. a. N. K. (2010). Design of A New Security Protocol Using Hybrid Cryptography Algorithms. International Journal of Research and Reviews, 2(2), 9.
[11] Dubai, M. J., Mahesh, T. R., & Ghosh, P. A. (2011, 8-10 April 2011). Design of new security algorithm: Using hybrid Cryptography architecture. Paper presented at the Electronics Computer Technology (ICECT), 2011 3rd International Conference on.
[12] Dr. Bhupinder Singh Dhaliwal, V. S. (2015). Reprogramming of Wireless Sensor Network Securely with New Hybrid Encryption Scheme. International Journal of Engineering Technology, Management and Applied Sciences, 3(4).
[13] Mrs.A.S. Bhave, M. S. R. J. (2014). Secure Communication in Wireless Sensor Network using Symmetric and Asymmetric Hybrid Encryption Scheme. International Journal of Innovative Science, Engineering & Technology, 1(4), 4.
[14] V. Vijayalakshmi, R. S. a. (2015). Hybrid Key Management Scheme for Wireless Sensor Networks. International Journal of Security and Its Applications, 9(11), 8.
[15] Ren, W., & Miao, Z. (2010, 15-16 May 2010). A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication. Paper presented at the Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on.# [16] Komal Rege, N. G., Pooja Bhutada, Sunil Mane. (2013). Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA. International Journal of Computer Applications, 71(22), 4.
[17] Mathew, J., Singh, A. K., Monika, & Upadhyaya, S. (2015). Proceedings of the 4th International Conference on Eco-friendly Computing and Communication Systems Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks. Procedia Computer Science, 70, 808-813.
[18] Rizk, R., & Alkady, Y. (2015). Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology, 2(3), 296-313.
[19] Yaeghoobi S. B., K., Soni, M. K., Tyagi, S. S., & Ebadati E., O. M. (2013). Impact of NP-Complete in Triangle Segments Tree Energy Efficiency Model in Wireless Sensor Networks. J. Basic. Appl. Sci. Res, 3(9), 8.
[20] Yaeghoobi S. B., K., Tyagi, S. S., Soni, M. K., & Ebadati E, O. M. (2014, 6-8 Feb. 2014). SAERP: An energy efficiency Real-time Routing protocol in WSNs. Paper presented at the Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on.
[21] Yazdinejad, M., Nayyeri, F., Ebadati E., O. M., & Afshari, N. (2017). Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption. In Internet of Things: Novel Advances and Envisioned Applications (pp. 127-147): Springer.