CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security Enhancement of WSN Data using Symmetric Data Encryption through Tabulation Method of Boolean Function Reduction

Published on September 2015 by Linoy A. Tharakan, R. Dhanasekaran
International Conference on Emerging Trends in Technology and Applied Sciences
Foundation of Computer Science USA
ICETTAS2015 - Number 3
September 2015
Authors: Linoy A. Tharakan, R. Dhanasekaran
439156d7-814b-4fe9-afbf-e2581d8476f5

Linoy A. Tharakan, R. Dhanasekaran . Security Enhancement of WSN Data using Symmetric Data Encryption through Tabulation Method of Boolean Function Reduction. International Conference on Emerging Trends in Technology and Applied Sciences. ICETTAS2015, 3 (September 2015), 1-5.

@article{
author = { Linoy A. Tharakan, R. Dhanasekaran },
title = { Security Enhancement of WSN Data using Symmetric Data Encryption through Tabulation Method of Boolean Function Reduction },
journal = { International Conference on Emerging Trends in Technology and Applied Sciences },
issue_date = { September 2015 },
volume = { ICETTAS2015 },
number = { 3 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icettas2015/number3/22386-2586/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emerging Trends in Technology and Applied Sciences
%A Linoy A. Tharakan
%A R. Dhanasekaran
%T Security Enhancement of WSN Data using Symmetric Data Encryption through Tabulation Method of Boolean Function Reduction
%J International Conference on Emerging Trends in Technology and Applied Sciences
%@ 0975-8887
%V ICETTAS2015
%N 3
%P 1-5
%D 2015
%I International Journal of Computer Applications
Abstract

Data transmitted across the Sensor network requires high confidentiality and integrity . Thus the most important issue in a WSN is security The common approach of imparting security is converting the data into ciphers which almost protect the data from external access. Though security is important the mechanisms for imposing security have sometimes results in an undesirable affect in the overall performance of the network . Thus the protection of data in the networks from external tampering is considered the one of the most important researches at this time. In this paper we proposed an algorithm that encrypt the data using a noble symmetric key encryption based on Boolean Quine-Mc Cluskey (tabulation)method of data manipulation.

References
  1. Frank Schäfer, Martin Kleinsteuber, Hagen Meyer "Wake-Up-Receiver In Energy Efficient Wireless Sensor Networks For Security Applications" Emeric Umbdenstock 2012
  2. John Paul Walters, Zhengqiang Liang "Wireless Sensor Network Security: A Survey security In Distributed, Grid, And Pervasive Computing". Auerbach Publications, Crc Press 2006
  3. D. W. Carman, P. S. Krus, And B. J. Matt. "Constraints And Approaches For Distributed Sensor Network Security". , Nai Labs, Network Associates, Inc. , Glenwood, Md, Technical Report 00-010, 2000.
  4. Linoy A Tharakan ,R Dhanasekaran "SEEMd -Security enabled Energy Efficient Middleware for WSN" ISBN No. 978-1-4799-3914-5/14/ ©2014 IEEEM. Gruteser, G. Schelle, A. Jain, R. Han, And D. Grunwald. "Privacy-Aware Location Sensor Networks". In 9th Usenix Workshop On Hot Topics In Operating Systems (Hotos Ix), 2003
  5. C. Ozturk, Y. Zhang, And W. Trappe. " Energy constrained Sensor Network Routing". In Proceedings of the 2nd Acm Workshop On Security Of Ad Hoc And Sensor Networks, 2004
  6. Anser Ghazzaal Ali Alquraishee And Jayaprakash Kar "A Survey On Security Mechanisms And Attacks In Wireless Sensor Networks" Contemporary Engineering Sciences, 135 – 147 Vol. 7, No. 3, 2014
  7. Dr. Ali Payandeh "Self-Protection Mechanism For Wireless Sensor Networks", International Journal Of Network Security & Its Applications (Ijnsa), Vol. 6, No. 3, May 2014
  8. Madhumita Panda "Security In Wireless Sensor Networks Using Cryptographic Techniques". Aamerican Journal Of Engineering Research (Ajer) 2014
  9. Ian F. Akyildiz, Weilian Su, Yogeshsankara saubramaniam, Ardialcayirci, "A Survey On Sensor Networks" ,IEEE Communications Magazine, Pages 102-114, August 2002.
  10. Priyanka Vasan , Manjit Behniwal "Secure and Reliable Data Transmission Using Homomorphic Encryption in WSN". International Journal of Advanced Research in Computer Science and Software Engineering . Volume 4, Issue 5, May 2014
  11. Jyoti Rajput, Naveen Garg. "A Survey on Secure Data Aggregation in Wireless Sensor Network" . International Journal of Advanced Research in Computer Science and Software Engineering. Volume 4, Issue 5, May 2014
  12. Linoy A Tharakan, Dr. R Dhanasekaran Energy Aware Data Compression in Wireless Sensor Network using an advanced RLE method – Matrix RLE (M-RLE) International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 17 (2015)
Index Terms

Computer Science
Information Sciences

Keywords

Cipher Data Compression Data Aggression Encryption Privacy Wsn