Abstract
Nodes in the wireless sensor networks (WSN) have limited battery power and deployed to run few days. In general, sensor nodes are placed at very complicated locations; therefore, charging or replacement of nodes battery is very difficult. Hence, it is highly unfavourable to use the complex data security method. The main objective of this paper is to develop an enhanced algorithm to provide secure data communication as well as to enhance the lifetime of the WSNs. We have developed a hybrid algorithm for the data encryption and decryption in WSN. As in symmetric approach the key sharing was a major issue, we have performed the key generation using ECC algorithm which is an asymmetric key algorithm, and using this key, we will encrypt and decrypt data using AES which is a symmetric key algorithm. Hence, we have developed an enhanced algorithm which exploits the advantages of the two algorithms. The proposed algorithm, which reduces complexity as compared with ECC, is used only for key generation and not for data encryption/decryption and it is more secure than AES as it has solved the problem of key sharing in AES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
P. Ganesan, R. Venugopalan and P. Peddabachagari, An Analysing and modelling encryption overhead for sensor network nodes, In Proceedings of the WSNA, pp. 151–159 (2003).
B. Przydatek, D. X. Song, and A. Perrig, SIA: secure information aggregation in sensor networks, Conference on Embedded Networked Sensor Systems (SenSys), pp. 255–265 (2003).
M. Panda, Security in Wireless Sensor Network using Cryptography Techniques, American Journal of Engineering Research (AJER), Vol. 3, pp. 50–56 (2014).
R. Pahal, V. Kumar, An Effective Implementation of AES, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, pp. 290–295 (2013).
Mahimkar, S. Rappaport, Secure DAV: A secure data aggregation and verification protocol for sensor networks, The IEEE Global Telecommunications Conference, pp. 2175–2179 (2004).
S. Nath, P. B. Gibbons, S. Seshan, and Z. Anderson, Synopsis diffusion for robust aggregation in sensor networks. In Proc. of the 2nd international conference on Embedded networked sensor systems (2004).
Jelena Misic, Vojislav Misic, Wireless personal area networks performance interconnections and security with IEEE 802.15.4., John Wiley & Sons Ltd, (2008).
Adnan Nadeem and Michael P. Howarth, A Survey of MANET Intrusion Detection and Prevention Approaches for Network Layer Attacks, IEEE Communications Surveys and Tutorials, vol. 15, no. 4, (2013).
S. Ozdemir and H. Ichakawa et al. (Eds.), Secure and reliable data aggregation for wireless sensor networks, LNCS 4836, pp. 102–109 (2009).
Z. Dawahdeh, N.S. Yaakob, A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem. Journal of Theoretical and Applied Information Technology, Vol. 85, pp. 290–297 (2016).
M. Chu, H. Haussecker, and Zhao, Scalable information-driven sensor querying and routing farad ad hoc heterogeneous sensor networks, The International Journal of High Performance Computing Applications, Vol. 16(3), pp. 293–313 (2009).
A. Ganesh, An Improved AES-ECC Hybrid Encryption Scheme for Secure Communication in Cooperative Diversity Based Wireless Sensor Network, IEEE- International Conference on Recent Trends in Information Technology, Vol 11 (2011).
Z. Dawadeh, N.S. Yakob, Modified Elgamal Elliptic Curve Cryptosystem using Hexadecimal Representation, Indian Journal of Science and Technology, Vol 8(15), 2015.
H. Hayouni and M. Hamdi, Secure data aggregation in WSNs, Proc. of the 2nd World Congress on Computer Applications and Information Systems, Vol 5, pp. 58–65 (2012).
Rawya Rizk and Yasmin Alkady, Two-phase hybrid cryptography algorithm for wireless sensor networks, Journal of Electrical Systems and Information Technology, pp. 296–313, (2015), Available online at www.sciencedirect.com.
Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAPA secure hop-by-hop data aggregation protocol for sensor networks, In Proc. of Acm Mobihoc, Vol. 5, pp. 55–60 (2006).
Tadiwa Elisha Nyamasvisva, Halabi Hasbullah, Multi-level security algorithm for random ZigBee wireless sensor networks, Information Technology (ITSim), International Symposium in Kuala Lumpur, IEEE, vol 2, 2010, pp. 612–617, (2010).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prakash, S., Rajput, A. (2018). Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_50
Download citation
DOI: https://doi.org/10.1007/978-981-10-7386-1_50
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7385-4
Online ISBN: 978-981-10-7386-1
eBook Packages: EngineeringEngineering (R0)