We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Implementation of Security in Wireless Sensor Network using Blowfish Algorithm

Published on November 2014 by S. Pon Priyadharshini, K. Sangeetha Ananthamani
International Conference on Innovations in Information, Embedded and Communication Systems
Foundation of Computer Science USA
ICIIECS - Number 3
November 2014
Authors: S. Pon Priyadharshini, K. Sangeetha Ananthamani
5a4f7603-1255-463f-8471-26616970041b

S. Pon Priyadharshini, K. Sangeetha Ananthamani . Implementation of Security in Wireless Sensor Network using Blowfish Algorithm. International Conference on Innovations in Information, Embedded and Communication Systems. ICIIECS, 3 (November 2014), 33-37.

@article{
author = { S. Pon Priyadharshini, K. Sangeetha Ananthamani },
title = { Implementation of Security in Wireless Sensor Network using Blowfish Algorithm },
journal = { International Conference on Innovations in Information, Embedded and Communication Systems },
issue_date = { November 2014 },
volume = { ICIIECS },
number = { 3 },
month = { November },
year = { 2014 },
issn = 0975-8887,
pages = { 33-37 },
numpages = 5,
url = { /proceedings/iciiecs/number3/18670-1492/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Information, Embedded and Communication Systems
%A S. Pon Priyadharshini
%A K. Sangeetha Ananthamani
%T Implementation of Security in Wireless Sensor Network using Blowfish Algorithm
%J International Conference on Innovations in Information, Embedded and Communication Systems
%@ 0975-8887
%V ICIIECS
%N 3
%P 33-37
%D 2014
%I International Journal of Computer Applications
Abstract

Wireless Sensor networks are used in wide range of applications such as military sensing and tracking, health monitoring, temperature monitoring, and other areas. Security services are critical in sensor networks. This security, enables the sensor nodes to transmit and receive the sensor values over the network, securely. Here, three sensors LM35, MQ6, LDR sensor are used the values are observed and shown in display. The values are transmitted securely using Atmega8L microcontroller and Zigbee module. In our paper, Blowfish algorithm is used which provides high data confidentiality. The proposed system improves the network security compared to the existing algorithm. The proposed system is implemented and simulated using Proteus software.

References
  1. Gurjeevan Singh 'Superiority of Blowfish Algorithm in Wireless Networks', International Journal of Computer Applications, April 2012.
  2. Pratibha Rohilla 'Blowfish algorithm: Security and Performance enhancement' , World academy of Informatics and Management Sciences, oct 2012.
  3. Majdi Al qdah, 'Simple Encryption Decryption Application' , Internation Journal of Computer Science and Security, June 2010.
  4. Krishnamurthy, Dr. V. Ramaswamy 'Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanchee effect', Intenational Journal of computer Science and Network Security,March 2008.
  5. Simar Preet Singh and Raman Maini 'Comparison of Data Encrytion Algorithms', International Journal of Computer Science and communication, June 2011
  6. M. Anand Kumar 'Investigating the efficiency of Blowfish and Rejindarl algorithms' ,International Journal of computer Network and Information Security,Feb 2012.
  7. Ch Panchamukesh 'An Implementation of Blowfish Encryption algorithm' ,International Journal of Computer Technology and applications, Feb 2011.
  8. Gurjeevan Singh, 'A Study of New trends in Blowfish algorithm' ,Internation Journal of Engineering research and applications, Feb 2011.
  9. C. R. Patel 'FPGA- Hardware Based DES & Blowfish Symmetric cipher algorithm for Encryption and Decryption of Secured wireless Data Communication' ,Journal of Information Knowledge and Research in Electronics and Communication Engineering, Nov 2012.
  10. Encryption Technology White paper, http://security. resist. ca/crypt. htm
  11. Wikipedia,'Encryption', http://en. wikipedia. org/wiki/Encryption, modified on 13 December 2006.
  12. Freeman J. , Neely R. , and Megalo L. 'Developing Secure Systems: Issues and Solutions'. IEEE Journal of Computer and Communication, Vol. 89, PP. 36-45. 1998
  13. Wikipedia, 'Bitwise operation' http://en. wikipedia. org/wiki/Bitwise_operation, last modified on10 December 2006.
  14. Zainul Abidin, Adharul Muttaqin 'A Simple Cryptography Algorithm for Microcontroller' International Journal of Emerging Technology and Advanced Engineering,2012.
  15. Ali E. Taki El_Deen, 'Microcontroller Application in Cryptography Techniques' Canadian Journal on Electrical and Electronics Engineering Vol. 1, No. 4, June 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Sensor Microcontroller Zigbee