CFP last date
22 April 2024
Reseach Article

Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks

by Chanchal Sharma, Vinit Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 41
Year of Publication: 2018
Authors: Chanchal Sharma, Vinit Kumar
10.5120/ijca2018917100

Chanchal Sharma, Vinit Kumar . Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks. International Journal of Computer Applications. 180, 41 ( May 2018), 34-39. DOI=10.5120/ijca2018917100

@article{ 10.5120/ijca2018917100,
author = { Chanchal Sharma, Vinit Kumar },
title = { Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 41 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number41/29405-2018917100/ },
doi = { 10.5120/ijca2018917100 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:19.357735+05:30
%A Chanchal Sharma
%A Vinit Kumar
%T Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 41
%P 34-39
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor is utilized as a part of numerous territories, for example, controlling, checking following. System security is a vital assignment that must be extremely considered when outlining a system. It is characterized as a methodology and process took after by a system head to ensure the system gadgets or the information from undesirable dangers and unapproved clients. System security is the imperative part in data security since it is in charge of securing all information went through system. In current period arrange security has turned out to be more critical for exchange of information starting with one PC then onto the next PC, in each association and the military. With the advancement of web security turn into a noteworthy worry for secure the vital information. Due to quickly expanding no of PC's in associations numerous systems has been built up. As per expanding of no of system and clients on the planet and increment the no of dangers and unapproved client that is the reason the system isn't sheltered and we required a security on the system.

References
  1. T.-H. Lin, C.-Y. Lin, and T. Hwang, ―Manin-the-Middle Attack on ‗Quantum Dialogu with Authentication Based on Bell States‘, International Journal of Theoretical Physics, pp. 1–5,2013.
  2. Z. Tan, P. Nanda, R. P. Liu, A. Jamdagni, and X. He, ―A System for Denial-of-Service. Attack Detection Based on Multivariate Correlation Analysis,‖ IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. 1, p. 1, 2013.
  3. U. Banerjee, A. Vashishtha, and M. Saxena, ―Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection, International Journal of Computer Applications, vol. 6, no. 7,pp. 1 5, Sep. 2010
  4. Dr.Asir Antony Gnaana Singh, E.Jebamalar Leavline‖ Data Mining in Network Security - Techniques & Tools: A Research Perspective‖, Journal of Theoretical and Applied Information Technology 20 November 2013. Vol.57 No.2.
  5. Davis.R, “The Data Encryption Standard in Perspective”, Proceeding of Communication Society magazine, IEEE, Vol 16, Nov 1978.
  6. Pranab Garg1, Jaswinder Singh Dilawari2, A Review Paper on Cryptography and Significance of Key Length, IJCSCE Special issue on “Emerging Trends in Engineering” ICETIE 2012.
  7. Vishwa gupta,2. Gajendra Singh ,3.Ravindra Gupta, Advance cryptography algorithm for improving data security, www.ijarcsse.com, Volume 2, Issue 1, January 2012 ISSN: 2277 128X.
  8. Siddharth Ghansela, Network Security: Attacks, Tools and Techniques, www.ijarcsse.com, Volume 3, Issue 6, June 2013 ISSN: 2277 128X.
  9. Ravi Sharma, Study of Latest Emerging Trends on Cyber Security and its challenges to Society, International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1 ISSN 2229-5518.
  10. Debasis Das1, U. A. Lanjewar2 and S. J. Sharma3, The Art of Cryptology: From Ancient Number System to Strange Number System, Web Site: www.ijaiem.org, Volume 2, Issue 4, April 2013 ISSN 2319 – 4847.
  11. E. Thambiraja, G.Ramesh, Dr. R. Umarani, “A survey on various most common encryption techniques,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012.
  12. Monika Agrawal, Pradeep Mishra,” A Comparative Survey on Symmetric Key Encryption Techniques,” International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, PP877-882.
  13. Vikash Kumar, Anshu Jain,P N Barwal “ Wireless Sensor Networks: Security Issues, Challenges and Solutions ”International Journal of Information & Computation Technology, Vol. 4, Number 8 (2014), pp. 859-868.
  14. Raja Anwar, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah and Kashif Naseer Qureshi “Security Issues and Attacks in Wireless Sensor Network”World Applied Sciences Journal 30 (10): 1224-1227, 2014.
  15. Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani “ Routing Attacks in Wireless Sensor Networks:A Survey,International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014.
  16. K.Venkatraman, J.Vijay Daniel, G.Murugaboopathi “Various Attacks in Wireless Sensor Network:Survey” International Journal of Soft Computing and Engineering, Vol.3,Issue-1, March 2013.
  17. Gursewak Singh, Rajni Bedi,“ A Survey of Various Attacks and Their Security Mechanisms in Wireless Sensor Network”, International Journal of Emerging Science and Engineering (IJESE), Volume-2, Issue-8, June 2014.
  18. Dr. Banta Singh Jangra, Vijeta Kumawat, “A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, Sep 2012.
  19. C K Marigowda1, Manjunath Shingadi, “Security Vulnerability Issues In Wireless Sensor Networks: A Short Survey”, International Journal of Advanced Research in Computer and Communication Engineering,Vol.2, Issue 7, July2013.
  20. Prerna Mahajan & Abhishek Sachdeva,”A study of Encryption Algorithms AES, DES and RSA for Security”, Global journal of Computer Science and Technology, Vol.8,No.15, (2013) pp.15-22.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network Data encryption algorithm MD5 SHA-1.