Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Efficient Security for Data Communication in Wireless Sensor Networks Using Raspberry PI


Affiliations
1 KLE Dr MSSCET, Belgaum, Karnataka, India
     

   Subscribe/Renew Journal


Information technology finds its wide application in many fields like healthcare, border security etc. where security of information is very important. With advancement in wireless sensor networks, gathering and processing of data have become much easier and affordable, due to its wide application, providing security to data is required. This work proposes a prototype that uses Raspberry Pi as secure sensor node that performs both regular encryption and XML encryption to provide security to the data collected by sensor nodes and transmit it to the master node in the WSN. The design uses a temperature sensor which can be replaced by any other sensor going forward and can be used in the field of healthcare, border security, and many other areas. The data are collected, processed, encrypted, and wirelessly communicated to the master node. Since there is direct interfacing between the sensor and Raspberry Pi, there is no risk of data loss. The idea of this paper is to meet the goal of comparing the two encryption techniques in terms of processing time and number of characters and to see which is better in terms of both the parameters.

Keywords

Wireless Sensor Networks, Temperature-Sensor, Raspberry Pi, XML Encryption.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Alajmi, N. (2014). Wireless sensor networks attacks and solutions. International Journal of Computer Science and Information Security, July, 12(7), 1-4.
  • Anand, D. G., Chandrakanth, H. G., & Giriprasad, M. N. (2012). Security threats & issues in wireless sensor networks. International Journal of Engineering Research and Applications, 2(1), 911-916.
  • Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of NextGeneration Networks, 1(1), 1-10.
  • Maurya, M., & Shukla, S. R. (2013). Current wireless sensor nodes (Motes): Performance metrics and constraints. International Journal of Advanced Research in Electronics and Communication Engineering, 2(1), 0-45.
  • Miyauchi, K. (2005). XML signature/encryption- The basis of web service security. NEC Journal of Advanced Technology, 2(1), 35-39.
  • Panda, M. (2014). Security in wireless sensor networks using cryptographic techniques. American Journal of Engineering Research, 3, 50-56.
  • Raspberry Pi. (2015). What is Raspberry Pi? Retrieved from https://www.raspberrypi.org/community/
  • Vujovic, V., & Maksimovic, M. (2014). Raspberry Pi as a Wireless Sensor Node: Performances and constraints. In 37th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO), (pp. 1013-1018).
  • W3C Recommendation (11 April 2013). XML Encryption Syntax and Processing Version 1.1. Retrieved fromhttp://www.w3.org/TR/xmlenc-corel

Abstract Views: 298

PDF Views: 0




  • Efficient Security for Data Communication in Wireless Sensor Networks Using Raspberry PI

Abstract Views: 298  |  PDF Views: 0

Authors

Shruti V. Jadhav
KLE Dr MSSCET, Belgaum, Karnataka, India
Ajay Acharya
KLE Dr MSSCET, Belgaum, Karnataka, India

Abstract


Information technology finds its wide application in many fields like healthcare, border security etc. where security of information is very important. With advancement in wireless sensor networks, gathering and processing of data have become much easier and affordable, due to its wide application, providing security to data is required. This work proposes a prototype that uses Raspberry Pi as secure sensor node that performs both regular encryption and XML encryption to provide security to the data collected by sensor nodes and transmit it to the master node in the WSN. The design uses a temperature sensor which can be replaced by any other sensor going forward and can be used in the field of healthcare, border security, and many other areas. The data are collected, processed, encrypted, and wirelessly communicated to the master node. Since there is direct interfacing between the sensor and Raspberry Pi, there is no risk of data loss. The idea of this paper is to meet the goal of comparing the two encryption techniques in terms of processing time and number of characters and to see which is better in terms of both the parameters.

Keywords


Wireless Sensor Networks, Temperature-Sensor, Raspberry Pi, XML Encryption.

References