Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation and Analysis of Authentication in Wireless Sensor Network using ZigBee

Smita S. Kulkarni, A. D. Bhoi

Abstract


Most Wireless Sensor Network (WSN) consist of various sensor nodes deployed at various locations. As these nodes are deployed at remote locations their security issue gains importance. Algorithms used for security depends on key size, computational time, power requirement. There are various symmetric and asymmetric cryptography algorithms like AES, DES, 3DES and RSA, ECC algorithm etc. Symmetric algorithm have advantages, as same key for encryption and decryption, lower power consumption. Asymmetric cryptography includes complex computations so hard to decrypt but also require more power than symmetric cryptographic algorithms. So considering advantages and disadvantages of both cryptographic techniques, in this proposed system, combining of AES and ECC for Wireless Sensor Network (WSN) using ZigBee. In this system data gathered from temperature, humidity and smoke sensor are applied to ECC encryption and then send to ZigBee transmitter. At receiver side data is decrypted using ECC algorithm and original data is recovered.

Keywords


WSN, AES, RSA, ECC, ZigBee, Hybrid, Symmetric, Asymmetric, Cryptography.

Full Text:

PDF

References


Li Chunqing, Zhang Jiancheng, “Research of ZigBee’s data security and protection”, International Forum on Computer Science-Technology and Applications 2009, IEEE, 2009, pp 298 - 302.

P.D. Khambre, S.S.Sambhare, P.S. Chavan, “Secure Data in Wireless Sensor Network via AES” " International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012

Kristin Lauter, “The Advantages of Elliptical Curve Cryptography for Wireless Security”, IEEE Wireless Communications 2004

G.V.S. Raju and Rehan Akbani,"Elliptic Curve Cryptosystem and its Applications ", IEEE 2003.

Meng Qianqian and Bao Kejin, “Security analysis for wireless networks based on ZigBee”, IEEE,vol 1, 2009, pp 158 - 160.

Bin Yang, “Study on security of wireless sensor network based on ZigBee standard." International Conference on Computational Intelligence and Security, IEEE, 2009, pp 426 - 430.

Madhumita PandaSecurity in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER) 2014

Saif Al-alak, Zuriati Ahmed, Azizol Abdullah and Shamala Subramiam, “AES and ECC Mixed for ZigBee Wireless Sensor Security”, International Scholarly and Scientific Research & Innovation 5(9) 2011

https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm

William Stallings, “Cryptography and Network Security- Principles and Practice” NY: Prentice Hall, 2011

https://msdn.microsoft.com

Sunil Gupta, Harsh Kumar Verma and AL Sangal, “Authentication Protocol for Wireless Sensor Networks” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering 2010.

G. Jai Arul Jose and C. Sajeev,” The security of elliptic curve cryptography over RSA cryptography” Elixir Comp. Sci. & Engg. 2011

S. Subasree and N. K. Sakthivel, “Design of a New Security Protocol using Hybrid Cryptographic Algorithms” IJRRAS 2010

S. Aruna, D. Anitha, Promit Roy and Riddhi Datta, “ Survey of Hybrid Cryptography Algorithms in WSN using ZigBee”, IJCTA 2016

N. Kumar, “A Secure communication wireless sensor networks through hybrid (AES+ECC) algorithm”, von LAP LAMBERT Academic Publishing, vol. 386, 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.