CFP last date
20 May 2024
Reseach Article

Lightweight Security Protocol for WiSense based Wireless Sensor Network

by Sahilkumar Chakraborty, Astha Nachrani, Aronee Dasgupta, Pritam Gajkumar Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 3
Year of Publication: 2016
Authors: Sahilkumar Chakraborty, Astha Nachrani, Aronee Dasgupta, Pritam Gajkumar Shah
10.5120/ijca2016910172

Sahilkumar Chakraborty, Astha Nachrani, Aronee Dasgupta, Pritam Gajkumar Shah . Lightweight Security Protocol for WiSense based Wireless Sensor Network. International Journal of Computer Applications. 145, 3 ( Jul 2016), 6-10. DOI=10.5120/ijca2016910172

@article{ 10.5120/ijca2016910172,
author = { Sahilkumar Chakraborty, Astha Nachrani, Aronee Dasgupta, Pritam Gajkumar Shah },
title = { Lightweight Security Protocol for WiSense based Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 3 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number3/25256-2016910172/ },
doi = { 10.5120/ijca2016910172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:45.991504+05:30
%A Sahilkumar Chakraborty
%A Astha Nachrani
%A Aronee Dasgupta
%A Pritam Gajkumar Shah
%T Lightweight Security Protocol for WiSense based Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 3
%P 6-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks have emerged as one of the leading technologies. These networks are designed to monitor crucial environmental parameters of humidity, temperature, wind speed, soil moisture content, UV index, sound, etc. and then transfer the required information to the base station. However, security remains the key challenge of such networks as critical data is being transferred. Most sensor nodes currently deployed have constraints on memory and processing power and hence operate without an efficient security protocol. Hereby a protocol which is lightweight and is secure for wireless sensor applications is proposed.

References
  1. W. S., Y. S., E. C. I.F. Akyildiz, "Wireless sensor networks: a survey," Computer Networks, pp. 393-422, 15 March 2002.
  2. C. S. K. M. Z. T. Raghavendra, Wireless Sensor Networks, 2004.
  3. H.-W. L. C. S. H. Al-Sakib Khan Pathan, "Security in Wireless Sensor Networks: Issues and Challenges," 2006.
  4. A. A. a. S. B. Shammi Didla, "Optimizing AES for Embedded Devices and Wireless Sensor Networks".
  5. V. B. A., K. J., V. S. Rajkumar, "Wireless Sensor Networks Issues and Applications," International Journal of Computer Technology and Applications, vol. 3, no. 5, pp 1667-1673, 2012.
  6. V. A. S. P. Archana Bharathidasan, "Sensor Networks: An Overview".
  7. WiSense, "WiSense WSN1101L Datasheet," 2015. [Online].
  8. Texas Intruments, "ti.com," Texas Instruments, 2015. [Online]. Available: http://www.ti.com/lit/ds/symlink/cc1101.pdf
  9. A. Toivonen, "Use of Symmetric and Asymmetric Cryptography in False Report," in Seminar on Network Security, 2007.
  10. S. R. A. R. a. N. K. J. N. R. Potlapally, "Analyzing the Energy Consumption of Security Protocols," International Symposium on Low Power Electronics and Design, pp. 25-27, 2003.
  11. G. A. a. B. R. Y. Wang, "A Survey of security issues in wireless sensor networks," IEEE Communications Surveys & Tutorial, vol. 8, no. 2, 2006.
  12. Texas Instruments, "TI," 2013. [Online]. Available: http://www.ti.com/lit/ds/symlink/msp430g2955.pdf.
  13. Crossbow, "TelosB datasheet," [Online]. Available: http://www.willow.co.uk/TelosB_Datasheet.pdf.
  14. M. T. J. P. K. M. D. S. Pierangela Samarati, "Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices," in 4th IFIP WG 11.2 International Workshop, WISTP, Passau, Germany, 2010.
  15. WiSense, "http://www.wisense.in/wsngui/," 2013. [Online].
  16. WiSense,"WiSense Documenation," WiSense, 2014. [Online]. Available: http:/www.wisense.in/api/html/SystemOverview.html
  17. G. H. R. M. I. V. Dai Yamamoto, "Performance and Security Evaluation of AES S-Box-based Glitch PUFs on FPGAs," in International Conference on Security, Privacy and Applied Cryptography Engineering, 2012.
  18. E. Trichina, "Combinational Logic Design for Aes Subbyte Transformation On Masked Data," in International Association for Cryptologic Research, 2003.
  19. W. Stallings, Cryptography and Network Security Principles and Practice, Prentice Hall, 2011.
  20. D. Selent, "Advanced Encryption Standard," InSight: Rivier Academic Journal, vol. 6, no. 2, 2010.
  21. WiSense, "WiSense," 2013. [Online]. Available: http://www.wisense.in/wsngui/nodes.
  22. WiSense, "WiSense," 2013. [Online]. Available: http://www.wisense.in/wsngui/sensors.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor nodes WiSense Encryption Decryption AES protocol optimizations Rijndael