CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys

by Rayala Upendar Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 7
Year of Publication: 2012
Authors: Rayala Upendar Rao
10.5120/8770-2696

Rayala Upendar Rao . Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys. International Journal of Computer Applications. 55, 7 ( October 2012), 48-52. DOI=10.5120/8770-2696

@article{ 10.5120/8770-2696,
author = { Rayala Upendar Rao },
title = { Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 7 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 48-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number7/8770-2696/ },
doi = { 10.5120/8770-2696 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:41.149517+05:30
%A Rayala Upendar Rao
%T Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 7
%P 48-52
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is an emerging technology, uses in many applications like boarder area enemy tracking system, fire alarm system, etc. Sensors are low power devices which possess huge attacks. These low power devices are not suitable for complex cryptographic algorithms. In this paper we implemented symmetric key algorithm with session keys. This concept carry better security compared previous secure routing algorithm in cluster wireless sensor networks. Here the forwarding node will check the both secrete global key and session key. It also checks one more parameter that is loading time of node, ensures more security.

References
  1. Hemanta Kumar Kalita and Avijit Kar, "Wireless Sensor Network Security Analysis", International Journal of Next-Generation Networks (IJNGN),Vol. 1, No. 1, December 2009.
  2. Chris Karlof David Wagner, " Secure Routing in Wireless Sensor Network: Attacks and CounterMeasures", Ad Hoc Networks 1 (2003) 293–315.
  3. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan," Energy-Efficient Communication Protocol for Wireless Microsensor Networks", Proceedings of the 33rd Hawaii International Conference on System Sciences – 2000.
  4. Seema Bandyopadhyay and Edward J. Coyle, " An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Netwroks", IEEE INFOCOM 2003 Twentysecond Annual Joint Conference of the IEEE Computer and Communications Societies IEEE Cat No03CH37428 (2003), 1713-1723.
  5. Taejoon Park and Kang G. Shin, "Secure Routing Based on Distributed Key Sharing in Large-Scale Sensor Networks", ACM Transactions on Embedded Computing Systems, Vol. 7, No. 2, Article 20, Publication date: February 2008.
  6. Peng Ning, An Liu,and Wenliang Du, "Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks", ACM Journal Name, Vol. , No. , 20, Pages 1–31.
  7. Yun Zhou, Yanchao Zhang, Yuguang Fang, "Access control in wireless sensor networks," Ad Hoc Networks 5 (2007) 3–13.
  8. WANG Xiao-yun , YANG Li-zhen, "SLEACH Secure Low. Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks", WUJNS Wuhan University Journal of Natural Sciences Vol. 10 No. 1 2005 127-131.
  9. Mandicou Ba, Ibrahima Niang, Bamba Gueye, "A Deterministic Key Management Scheme for "Securing Cluster-Based Sensors Networks", 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, ISBN: 978-0-7695-4322-2.
  10. Chris Karlof and David Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and countermeasures," Ad Hoc Networks 1 (2003) 293–315.
  11. Pooja Kumari, Mukesh Kumar, Rahul Rishi, "Study of Security in Wireless Sensor Networks", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (5) 2010, 347-354.
Index Terms

Computer Science
Information Sciences

Keywords

Security Routing session key Secrete key Cluster