Skip to main content

Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 696))

Abstract

Nodes in the wireless sensor networks (WSN) have limited battery power and deployed to run few days. In general, sensor nodes are placed at very complicated locations; therefore, charging or replacement of nodes battery is very difficult. Hence, it is highly unfavourable to use the complex data security method. The main objective of this paper is to develop an enhanced algorithm to provide secure data communication as well as to enhance the lifetime of the WSNs. We have developed a hybrid algorithm for the data encryption and decryption in WSN. As in symmetric approach the key sharing was a major issue, we have performed the key generation using ECC algorithm which is an asymmetric key algorithm, and using this key, we will encrypt and decrypt data using AES which is a symmetric key algorithm. Hence, we have developed an enhanced algorithm which exploits the advantages of the two algorithms. The proposed algorithm, which reduces complexity as compared with ECC, is used only for key generation and not for data encryption/decryption and it is more secure than AES as it has solved the problem of key sharing in AES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. P. Ganesan, R. Venugopalan and P. Peddabachagari, An Analysing and modelling encryption overhead for sensor network nodes, In Proceedings of the WSNA, pp. 151–159 (2003).

    Google Scholar 

  2. B. Przydatek, D. X. Song, and A. Perrig, SIA: secure information aggregation in sensor networks, Conference on Embedded Networked Sensor Systems (SenSys), pp. 255–265 (2003).

    Google Scholar 

  3. M. Panda, Security in Wireless Sensor Network using Cryptography Techniques, American Journal of Engineering Research (AJER), Vol. 3, pp. 50–56 (2014).

    Google Scholar 

  4. R. Pahal, V. Kumar, An Effective Implementation of AES, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, pp. 290–295 (2013).

    Google Scholar 

  5. Mahimkar, S. Rappaport, Secure DAV: A secure data aggregation and verification protocol for sensor networks, The IEEE Global Telecommunications Conference, pp. 2175–2179 (2004).

    Google Scholar 

  6. S. Nath, P. B. Gibbons, S. Seshan, and Z. Anderson, Synopsis diffusion for robust aggregation in sensor networks. In Proc. of the 2nd international conference on Embedded networked sensor systems (2004).

    Google Scholar 

  7. Jelena Misic, Vojislav Misic, Wireless personal area networks performance interconnections and security with IEEE 802.15.4., John Wiley & Sons Ltd, (2008).

    Google Scholar 

  8. Adnan Nadeem and Michael P. Howarth, A Survey of MANET Intrusion Detection and Prevention Approaches for Network Layer Attacks, IEEE Communications Surveys and Tutorials, vol. 15, no. 4, (2013).

    Google Scholar 

  9. S. Ozdemir and H. Ichakawa et al. (Eds.), Secure and reliable data aggregation for wireless sensor networks, LNCS 4836, pp. 102–109 (2009).

    Google Scholar 

  10. Z. Dawahdeh, N.S. Yaakob, A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem. Journal of Theoretical and Applied Information Technology, Vol. 85, pp. 290–297 (2016).

    Google Scholar 

  11. M. Chu, H. Haussecker, and Zhao, Scalable information-driven sensor querying and routing farad ad hoc heterogeneous sensor networks, The International Journal of High Performance Computing Applications, Vol. 16(3), pp. 293–313 (2009).

    Google Scholar 

  12. A. Ganesh, An Improved AES-ECC Hybrid Encryption Scheme for Secure Communication in Cooperative Diversity Based Wireless Sensor Network, IEEE- International Conference on Recent Trends in Information Technology, Vol 11 (2011).

    Google Scholar 

  13. Z. Dawadeh, N.S. Yakob, Modified Elgamal Elliptic Curve Cryptosystem using Hexadecimal Representation, Indian Journal of Science and Technology, Vol 8(15), 2015.

    Google Scholar 

  14. H. Hayouni and M. Hamdi, Secure data aggregation in WSNs, Proc. of the 2nd World Congress on Computer Applications and Information Systems, Vol 5, pp. 58–65 (2012).

    Google Scholar 

  15. Rawya Rizk and Yasmin Alkady, Two-phase hybrid cryptography algorithm for wireless sensor networks, Journal of Electrical Systems and Information Technology, pp. 296–313, (2015), Available online at www.sciencedirect.com.

  16. Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAPA secure hop-by-hop data aggregation protocol for sensor networks, In Proc. of Acm Mobihoc, Vol. 5, pp. 55–60 (2006).

    Google Scholar 

  17. Tadiwa Elisha Nyamasvisva, Halabi Hasbullah, Multi-level security algorithm for random ZigBee wireless sensor networks, Information Technology (ITSim), International Symposium in Kuala Lumpur, IEEE, vol 2, 2010, pp. 612–617, (2010).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiva Prakash .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prakash, S., Rajput, A. (2018). Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7386-1_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7385-4

  • Online ISBN: 978-981-10-7386-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics