0% found this document useful (0 votes)
43 views5 pages

Analyzing and Securing Data Transmission in Wireless Sensor Networks Through Cryptography Techniques

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL :http://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views5 pages

Analyzing and Securing Data Transmission in Wireless Sensor Networks Through Cryptography Techniques

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL :http://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Analyzing & Securing Data Transmission in Wireless Sensor


Networks through Cryptography Techniques
Shahid Ishaq1*, Rashmi Raj2
1ResearchScholar, 2Assistant Professor
Department of Electronics and Communication Engineering,
Universal Institute of Engineering & Technology, Mohali, Punjab

ABSTRACT How to cite this paper: Shahid Ishaq |


Wireless Sensor Networks are gaining popularity in various fields and areas. Rashmi Raj "Analyzing & Securing Data
But these nodes are vulnerable as they are open networks and easily Transmission in Wireless Sensor
accessible. The major challenge is to have a secure data transmission between Networks through
the nodes. To establish a secure transmission, we require a security scheme Cryptography
like a cryptographic algorithm, but this also requires a secure key distribution Techniques"
between nodes. The WSN’s have constraints like limited area, power and Published in
memory which restrict all the categories of cryptographic algorithm. International Journal
Depending upon the criteria’s and constraints, cryptographic algorithm like of Trend in Scientific
Elliptic Curve Cryptography (ECC) is best suitable for WSN’s environment. ECC Research and IJTSRD30328
has a smaller key size, high security and less computation time which makes Development
the node an efficient crypto system. In order to protect the security of data, we (ijtsrd), ISSN: 2456-6470, Volume-4 |
propose a novel secure transmission strategy based on Cryptography. In this Issue-3, April 2020, pp.171-175, URL:
design, we acquire sensitive information securely so as to make use of the www.ijtsrd.com/papers/ijtsrd30328.pdf
advantage of encryption. Our approach deal with the weakness of limitation in
sensor node resources and the security threats, it is suitable for stream data in Copyright © 2020 by author(s) and
sensor nodes. The simulation experiments also demonstrate that this International Journal of Trend in Scientific
approach is effective in transmitting sensitive data covertly with the Research and Development Journal. This
characteristics of lower energy consumptions and invisibility. This paper is an Open Access article distributed
describes the implementation of ECC cryptosystem for WSN for secure key and under the terms of
data transmission between the nodes. the Creative
Commons Attribution
KEYWORDS: WSN, IEEE 802.15, Cryptograhical, Remote Sensor License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)

INTRODUCTION
Wireless sensor network (WSN) is a self-organized multi- proposed to stream data, which conceals and extracts the
hop network composed of a large number of sensor nodes sensitive data effectively with low energy consumption.
[1]. Each sensor node has the ability to sense data, process
data, and communicates with others, so it is data-centric The functionality of sensor nodes is limited by processing
network. WSN is typically used in environment monitoring, power, storage capacity, communication, and battery
healthcare, traffic management and battlefield. The data resources. The nodes are always exposed in open fields
transmitted between the nodes may be sensitive (e.g. where they are unreachable. Any node may become a attack
offensive weapon, troop movement, defense information). target with external and internal security risks including
The whole network will be threatened if they are revealed by eavesdrop, DoS (Denial-of-Service), leak, tamper, infuse,
an eavesdropper. So it is vital for us to adopt effective playback, misguide, disrupt and others.
strategy to ensure the transmission safety of the secret
information. WSN needs to guarantee the security of network, nodes and
data, while the security of the data is the most important
In this paper, we propose a new secure transmission including confidentiality, authentication, integrity and
strategy based on encryption by using its characteristic Freshness. The existing threats in WSN could be solved by
which shrouds the data security without encryption, to aim making use of the data security technology to a great extent.
at the weakness of limitation in sensor node resources and
the security threats. Cryptography and digital watermarking are the two major
data security technologies. At present, the mechanism to
Unlike in existing schemes, it transmits data after embeds solve this is mainly cryptography based such as data
sensitive information into ordinary information. Compared encryption, message authentication, integrity ensuring and
with existing strategies, our strategy has obvious broadcast validation. The available asymmetric
advantages. Transmitting the encryptive sensitive data can cryptography and other ciphers cannot suitable due to the
decrease the risk of communication from being monitored, hardware restrictions. So researches of data security focus
intercepted and the communication overhead can be on key establishment, exchange, distribution and
decreased. A real time hiding/extraction algorithm is management mostly. Examples include pre-distribution,

@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 171
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
random key assignment, pair-wise key scheme, group-wise Problems to be Evaluated:
key scheme, and etc. Proposed a proficient gathering key exchange convention in
view of a direct mystery sharing for remote sensor systems
(WSNs), if aggregate key validation. Security examination for
conceivable assaults is incorporated. Therefore, this
convention can oppose potential assaults and furthermore
fundamentally diminish the overhead of framework
execution.

Proposed Algorithm:
Here we have implemented ECC for WSN on a Matlab
simulator. From the survey made in our earlier stages, we
can conclude that ECC is a better algorithm than RSA as it
requires smaller key without compromising with the
security aspects. We have tried to implement a topology.

Fig No. 1.1: Basic blocks of Sensing Networks One of the major concerns is the mutual authentication
between the nodes in WSN’s. This issue is resolved by the
proposed ECC technique used for secure data
communication.
The authentication and key management technologies in
WSN become burdensome, which depend on the security of In our topology there is a Sender and a Receiver, where they
key heavily. It is difficult to be solved entirely only by secure are communicating and data transfer takes place among
key. Designing a new security mechanism, obviating them self. We also have shown an attacker as Eve, who also
potential security problem effectively and reducing security tries to access the data transmitted between the Sender and
threat are hard assignment. New approaches are required the Receiver. Since the data and WSN nodes, both are in open
for WSN development and application. and vulnerable for attackers, there is a need for security
within the nodes and for the data. By implementing ECC in
As the WSN’s communication is open, WSNs are highly WSN, the nodes can securely transmit data. The Sender and
susceptible and at high risk, thereby effecting the entire Receiver each generate their own Private Key and Public Key
system, if suitable safety measures are not taken. for each others. These keys are generated using the elliptic
Authentication between WSN’s plays an important role in curve and the points on that curve generated. Both the
securing data transmission against various types of attacks Sender and receiver decide on to which curve and the finite
like node impersonation, falsification of data, replay attacks points. When a node wants to communicate or send date
etc. Another issue is that WSN’s are a combination of many with some other node, then the sender node uses its own
tiny and low-cost sensor nodes where they have limited Private Key and the Public Key of the intended node to
energy and limited computation ability to processor transmit generate a Shared Key. This Shared Key is used for
the data. Thereby securing WSNs with it presents Encryption of the data to send across other nodes. Once a
environmental resource-constrained has been becoming a node receives a data, the receiver also generates a Shared
challenging task. WSN’s is a combination of multiple self Key. This Shared Key is used for Decryption of the data at the
organized sensor nodes capable of communicating receiver end. On the other hand the Eve also receives the
wirelessly and security requirements are similar to any Public Keys generated by both the Sender and the Receiver
usual computer networks [1, 2]. As the WSNs have various nodes. We also try to show that the Eve in spite of having the
constrains, all security solutions applicable for conventional Public Keys of both the nodes still cannot generate the
computer networks Shared Keys as the Eve does not have the Private Keys of
both the nodes, thus securing the data. We also show that
even if the Eve generates same set of points in the elliptic
curve and assuming that Eve also has same set of finite
points, still it is not possible for the Eve to generate the
Shared key. By the time Eve tries to decrypt the data using
various keys, next set of data transmissions are over

Fig No. 1.2: Functionality of a Sensor Node

@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 172
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470

Fig No.1.4: Total stimulation time graph

Fig No 1.5: Simulation time required and dead and alive


nodes information of base paper

Results:
In the wake of performing nuts and bolts of calculation we
have gotten taking after reproduction comes about
indicating essentials of encryption unscrambling comes
about. Utilization of this symmetric calculation gives us the
outcomes demonstrating that the this calculation is more
suited over the uneven ones as the symmetrical calculations
are more dependable with variable key administration era
procedures giving productive security objectives as the key
size is in distinguishable and shifted at each progression Fig No 1.6: Simulation cluster formation
without being in need to make them known to all hubs in a
system as private key is not figured by open key of the
system gave as a security highlight of deviated
cryptosystems. Likewise the symmetrical cryptosystems are
more effective in security objectives accomplishment when
contrasted with asymmetrical ones as they have to give the
connection keys publically which causes unapproved
assaults and client's information security surrenders.

Fig No 1.7: Energy dissipation over time of proposed work


simulation results
Fig No. 1.3: Nodes formation for base paper.

@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 173
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470

Fig No 1.8: Comparison of nodes-70,100,150 for energy


dissipation graphs for proposed work. Fig No 1.12 : Comparison graphs between base paper and
proposed work on the basis of energy dissipation

Conclusion:
We have compared files of various sizes and compared both
the algorithms. The results are also shown in terms of bar
graphs as shown. The comparison has been made with the
standard algorithm, which is a traditional and the most used
algorithm, with proposed algorithm. In our findings, here it
is clearly seen that ECC consumes more time once in the
beginning, we can see that, for a file size of 7 KB the
encryption is drastically more for encryption and from 12 KB
it requires less time and increases gradually for encryption.
Though ECC requires more time for encryption, the key size
is too small compared to RSA. However the decryption time
taken by ECC is very less than the traditional RSA algorithm,
even if the file size increases as shown. The decryption time
for ECC is nearly similar for all files compared to RSA
algorithm. Compared with the other three results, our
obtained results are better by an average of 20%. The
implementation of Elliptic curve can be further extended to
a) For base work-total stimulation time b) for proposed implement on hyper elliptic curves on WSN. Further the ECC
work-total stimulation time can also have various types of point generation methods on
Fig No 1.9: Nodes comparison for energy dissipation the curve and ECC can also be integrated with other
graphs for proposed work cryptographic algorithms for additional security.

ACKNOWLEDGEMENT
I express my sincere gratitude to the I.K.Gujral Punjab
Technical University, Jalandhar for giving me the
opportunity to work on the thesis during my final year of
M.Tech. I owe my sincerest gratitude towards Dr. Prabhjot
Kaur, Director Engg, Universal Institute of Engineering
and Technology, Lalru, for valuable advice and healthy
criticism throughout my thesis which helped me
immensely to complete my work successfully.
I would like to express a deep sense of gratitude and
thanks profusely to Er. Rashmi Raj Assistant Professor,
Department of Electronics & Communication Engineering,
Fig No 1.10 : Delay graphs of 100-nodes-comparision b/w UIET, who was the thesis Supervisor. Without the wise
base paper and proposed work counsel and able guidance, it would have been impossible
to complete the thesis in this manner.
I would like to thank the members of the Departmental
Research Committee for their valuable suggestions and
healthy criticism during my presentation of the work. I
express gratitude to other faculty members of Electronics &
Communication Engineering Department, UIET, for their
intellectual support throughout the course of this work.

Fig No 1.11: Combined delay graphs between base paper


and proposed work

@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 174
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
References: [7] A. Rasheed and R. Mahapatra, "Key redistribution plans
[1] T. Gao, D. Greenspan, M. Welsh, R. R. Juang, and A. Alm, for building up pairwise keys with aversatile sink in
"Fundamental signs observing and understanding sensor systems," IEEE Trans. Parallel Distrib. Syst., vol.
following over a remote system," in Proc. IEEE 27th 22, no. 1, pp. 176–184,Jan. 2011.
Annu. Int. Conf. Eng. Med. Biol. Soc. (IEEE-EMBS), Jan.
[8] S, Ruj, A, Nayak, and I. Stojmenovic, "Pairwise and triple
2006, pp. 102–105.
key dispersion in remote sensor systems with
[2] L. Gu et al., "Lightweight recognition and grouping for applications," IEEE Trans. Comput., vol. 62, no. 11, pp.
remote sensor arranges in reasonable conditions," in 2224–2237, Nov. 2013.
Proc. third ACM Conf. Implanted Network Sensor
[9] F. Li and P. Xiong, "Reasonable secure correspondence
System, Nov. 2005, pp. 205–217.
for incorporating remote sensor systems into the
[3] G. J. Pottie and W. J. Kaiser, "Remote incorporated Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp.
system sensors," Communication ACM,vol. 43, no. 5, pp. 3677–3684, Oct. 2013.
51–58, 2000.
[10] R. Blom, "Non-open key appropriation," in Advances in
[4] L. Eschenauer and V. D. Gligor, "A key-administration Cryptology, D. Chaum, R. L. Rivest, and A. T. Sherman,
plot for dispersed sensor systems," inProc. ninth ACM Eds. New York, NY, USA: Plenum, 1982, pp. 231–236.
Conf. CCS, 2002, pp. 41–47.
[11] Daehee Kim, Sunshin ―Ef icient and Scalable Public
[5] H. Chan, A. Perrig, and D. Melody, "Irregular key pre Key Infrastructure for Wireless Sensor Networks‖, This
appropriation plans for sensor systems,"in Proc. IEEE work was partly supported by the National Research
Symp. SP, May 2003, pp. 197–213. Foundation of Korea (NRF) grant funded by the Korea
government (MEST), (No. 2012KlA3AlA09026959)
[6] W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A
978-1-4799-5874-0/14/©2016 IEEE.
key administration conspire forremote sensor systems
utilizing organization learning," in Proc. IEEE
INFOCOM, Mar. 2004, pp.586–597.

@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 175

You might also like