Advertisement

Efficient Hybrid Method for Intrinsic Security Over Wireless Sensor Network

  • G. Sangeetha
  • K. Kalaiselvi
Chapter
  • 31 Downloads
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 637)

Abstract

Secrecy communication is promising particularly for wireless systems due to the transmission environment of the radio path, which is simply interrupted. Wireless security methods have classically improved for conventional wireline applications, and these techniques are not assumed substantial properties of the wireless channels. To overcome these problems, in this research work a foundation was developed to introduce and examine the wireless networks inhibiting confidentiality presented via node spatial distribution, wireless propagation medium and combined network interference. This work proposed an approach, called as blowfish algorithm and secure hash algorithm (SHA), for the security which are inner qualities. Blowfish, a 64-bit symmetric block cipher which utilizes a key having the variable length from 32 bits to 448 bits, includes 16 rounds and produces the key-dependent S-boxes. It is faster speed for the procedure of encryption/decryption of group communication information from the given network. A hybrid method blowfish with SHA is proposed in this work to improve the security for ensuring secrecy from the eavesdroppers. It is used to ensure the higher security in terms of reliability and security in the given network by using efficient cryptography algorithm. The result shows that the formulated system produces higher efficiency in terms of better security rather than the existing system. The proposed hybrid BF + SHA algorithm provides higher ratio of packet delivery, average delay and throughput than the existing system.

Keywords

Intrinsic security Blowfish algorithm and secure hash algorithm (SHA) Communication WSN 

References

  1. 1.
    Li, J., et al.: An intelligent wireless sensor networks system with multiple servers communication. Int. J. Distrib. Sens. Netw. 11(8), 960173 (2015)CrossRefGoogle Scholar
  2. 2.
    Rezvani, M., et al.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2014)CrossRefGoogle Scholar
  3. 3.
    Barros, J., Bloch, M.: Strong secrecy for wireless channels. In: Proceedings of International Conference on Information Theoretic Security, Calgary, Canada, Aug 2008Google Scholar
  4. 4.
    Koyluoglu, O.O., Koksal, C.E., Gamal, H.E.: On secrecy capacity scaling in wireless networks. Information Theory and Applications Workshop, San Diego, CA, pp. 1–4, Feb 2010Google Scholar
  5. 5.
    Ghasemi, A., Sousa, E.S.: Interference aggregation in spectrum-sensing cognitive wireless networks. IEEE J. Sel. Top. Signal Process 2(1):41–56 (2008)CrossRefGoogle Scholar
  6. 6.
    Shen, J., et al.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)CrossRefGoogle Scholar
  7. 7.
    Liu, T., Shamai, S.: A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans. Inf. Theory 55(6), 2547–2553 (2009)Google Scholar
  8. 8.
    Pinto, P.C., Barros, J., Win, M.Z.: Secure communication in stochastic wireless networks—Part II: Maximum rate and collusion. IEEE Trans. Inf. Forensics Secur. 7(1), 139–147 (2011)CrossRefGoogle Scholar
  9. 9.
    Geraci, G., et al.: Secrecy rates in broadcast channels with confidential messages and external eavesdroppers. IEEE Trans. Wirel. Commun. 13(5), 2931–2943 (2014)Google Scholar
  10. 10.
    Krishnamurthy, G.N., et al.: Performance enhancement of Blowfish and CAST-128 algorithms and security analysis of improved Blowfish algorithm using Avalanche effect. IJCSNS 8(3), 244 (2008)Google Scholar
  11. 11.
    Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. Federal Information Processing Standards (NIST FIPS)-202 (2015)Google Scholar
  12. 12.
    Sudha, M., Monica, M.: Enhanced security framework to ensure data security in cloud computing using cryptography. Adv. Comput. Sci. Its Appl. 1(1), 32–37 (2012)Google Scholar
  13. 13.
    Oliviero, F., Romano, S.P.: A reputation-based metric for secure routing in wireless mesh networks. IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference. IEEE (2008)Google Scholar
  14. 14.
    Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515–2534 (2008)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Bhalaji, N.: Performance evaluation of flying wireless network with Vanet routing protocol. J ISMAC 1(01), 56–71 (2019)Google Scholar
  16. 16.
    Rabbachin, A., Conti, A., Win, M.Z.: Intentional network interference for denial of wireless eavesdropping. In: 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. IEEE (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • G. Sangeetha
    • 1
  • K. Kalaiselvi
    • 1
  1. 1.Department of Computer Science, School of Computing SciencesVels Institute of Science Technology and Advanced Studies (VISTAS), Formerly Vels UniversityChennaiIndia

Personalised recommendations