Open Access Open Access  Restricted Access Subscription Access

Enhanced Security for Non English Users of Wireless Sensor Networks


Affiliations
1 S.I.E.T, Tumkur, Visvesvaraya Technological University, Belgavi, India
2 A.I.T, Tumkur, Visvesvaraya Technological University, Belgavi, India
3 Dept. Of CSE, Channabasaveshwara Institute of Technology, Gubbi, Tumkur, India
 

Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.

Keywords

BDNA, Sensor Networks, MD5.
User
Notifications
Font Size

  • Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
  • Prajapati Ashishkumar B, Prajapati Barkha, 2016.Implementation of DNA Cryptography in Cloud Computing and Using socket Programming. IEEE, New Delhi, Jan 2016, p. 07-09.
  • Carlos F. Caloca de la Parra, J. Antonio GarciaMacias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly.
  • Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hashbased Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-47995627-2/14, 2014.
  • I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012.
  • Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011.
  • Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
  • Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hashbased Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-47995627-2/14, 2014
  • Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP 2011, pp. 217-222.
  • M. A. Simplicio, et aI., "Comparison of authenticatedencryption schemes in wireless sensor networks," in IEEE LCN 2011, pp. 450- 457.
  • Y. Shuai, et aI., "A new design of security wireless sensor network using efficient key management scheme," in IEEE NIDC 20 I 0, pp. 504-508.

Abstract Views: 211

PDF Views: 0




  • Enhanced Security for Non English Users of Wireless Sensor Networks

Abstract Views: 211  |  PDF Views: 0

Authors

N. J. Mallikarjunaswamy
S.I.E.T, Tumkur, Visvesvaraya Technological University, Belgavi, India
T. R. Latha Yadav
A.I.T, Tumkur, Visvesvaraya Technological University, Belgavi, India
Keshava Prasanna
Dept. Of CSE, Channabasaveshwara Institute of Technology, Gubbi, Tumkur, India

Abstract


Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.

Keywords


BDNA, Sensor Networks, MD5.

References