CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Secure and Energy Efficient Communication in Wireless Sensor Network

Published on July 2018 by Mukesh Patil, Nalini A. Mhetre
International Conference on “Internet of Things, Next Generation Networks and Cloud Computing"
Foundation of Computer Science USA
ICINC2017 - Number 1
July 2018
Authors: Mukesh Patil, Nalini A. Mhetre
95a9d47b-a3d3-490e-9fe6-467515850ce3

Mukesh Patil, Nalini A. Mhetre . Secure and Energy Efficient Communication in Wireless Sensor Network. International Conference on “Internet of Things, Next Generation Networks and Cloud Computing". ICINC2017, 1 (July 2018), 39-43.

@article{
author = { Mukesh Patil, Nalini A. Mhetre },
title = { Secure and Energy Efficient Communication in Wireless Sensor Network },
journal = { International Conference on “Internet of Things, Next Generation Networks and Cloud Computing" },
issue_date = { July 2018 },
volume = { ICINC2017 },
number = { 1 },
month = { July },
year = { 2018 },
issn = 0975-8887,
pages = { 39-43 },
numpages = 5,
url = { /proceedings/icinc2017/number1/29674-1750/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on “Internet of Things, Next Generation Networks and Cloud Computing"
%A Mukesh Patil
%A Nalini A. Mhetre
%T Secure and Energy Efficient Communication in Wireless Sensor Network
%J International Conference on “Internet of Things, Next Generation Networks and Cloud Computing"
%@ 0975-8887
%V ICINC2017
%N 1
%P 39-43
%D 2018
%I International Journal of Computer Applications
Abstract

Cryptographic data transmission from one node to another node in a secure way is the challenging goal in Wireless Sensor Network (WSN). In WSN security is achieved through Message Authentication Code (MAC) as well as Encryption algorithm. Consolidation of MAC and Encryption strategy will provide the high security for data or message which is used for communication. In communication system, confidentiality of data and cost of transmission of data are the key aspects. Along with the security, energy is also the major challenge in WSN. In WSN sensor nodes have the small amount of resources such as bandwidth, power etc. Hence conservation of energy and establishment of security are two major parameters in WSN. This paper proposes the details of the shortest path generation algorithm, which efficiently satisfies mentioned constraints and security is established using ECC algorithm.

References
  1. H. Krawczyk, "The Order of Encryption and Authentication forProtecting Communications (or: How Secure Is SSL?)," Proc. 21stAnn. Int'l Cryptology Conf. (CRYPTO '01), pp. 310-331, 2001.
  2. Aida Vosoughi, RajendraKatti,"Fast Message Authentication Code for Multiple Messages with Provable Security", IEEE Globecom 2010 proceedings J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed. , vol. 2. Oxford: Clarendon, 1892, pp. 68-73.
  3. RadhaPoovendran Senior Member, IEEE and Basel Alomair, Member, IEEE," ?-MACs: Toward More Secure and More Efficient Constructions of Secure Channels", 204 IEEE transactions on computers, Vol. 63, No. 1, JANUARY 2014.
  4. Jun Deng, Rongqing Zhang, (Student Member, IEEE), Lingyang Song, (Senior Member, IEEE), Zhu Han, (Senior Member, IEEE), and Bingli Jiao, (Senior Member, IEEE)," Truthful Mechanisms for Secure Communication in Wireless Cooperative System", IEEE transactions onwirelesscommunications, Vol. 12, No. 9, September 2013.
  5. B. Alomair and R. Poovendran, "Efficient Authentication for Mobile and Pervasive Computing," Proc. 12th Int'l Conf. Information and Comm. Security (ICICS '10), 2010.
  6. P. Raghu Vamsi and Krishna Kant "Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review", Fourth International Conference on Advanced Computing Communication Technologies, 2014.
  7. Attila Altay Yavuz, ``An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages", IEEE transactions on information forensics and security, vol. 9, No. 10, October 2014.
  8. Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg, Xiaochen Li, and GautamThatte, ``Energy-Efficient Group Key Agreement for Wireless Networks", IEEE transactions on wireless communications, vol. 14, NO. 10, October 2015.
  9. FeiHuo and Guang Gong, ``XOR Encryption Versus Phase Encryption, an In-Depth Analysis" IEEE transactions on electromagnetic compatibility.
  10. Helena Handschuh and Bart Preneel, ``Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms", International Association for Cryptologic Research 2008.
  11. Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems.
Index Terms

Computer Science
Information Sciences

Keywords

Security Message Authentication Code (mac) Wsn Universal Hash Function Authenticated Encryption Elliptic Curve Cryptography.