Abstract
Secure routing of information is one of the major concerns of specialist working in the field of wireless sensor networks (WSNs) as sensor nodes gather information from the physical world and transmit to base stations for authorized users to access via the internet. In a WSN, sensor nodes are deployed most of the times in unattended locations where there is the possibility of authorized or unauthorized access. This and others have brought the need to secure transmitted information from intruders. Though there are many ways to provide security to a network, cryptography has been identified as the best way for these main three security requirements which include: data confidentiality, authentication, and integrity (CIA). In this paper, we present an overview of the present challenges in a WSN and outline a number of countermeasures to solve these challenges. To tackle the challenge of security encountered in existing WSN systems, we propose an efficient and robust encryption and decryption algorithms for secure communication. The major key feature of this algorithm is that it combines both substitution and transposition cipher techniques in order to achieve the encrypted text. The algorithm is the outcome of the inspection of various existing algorithms in this field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alotaibi M (2019) Security to wireless sensor networks against malicious attacks using Hamming residue method. EURASIP J Wirel Commun Netw, 1–7. https://doi.org/10.1186/s13638-018-1337-5
Li P, Sun L, Fu X, Ning L (2013) Security in wireless sensor networks. In: Wireless network security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_8
Liwandouw V, Wowor A (2017) The existence of cryptography: a study on instant messaging. Procedia Comput Sci 124:721–727
Chelli K (2015) Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the world congress on engineering. London, U.K.
Sanchez J, Correa R, Buena H, Arias S, Gomez H (2016) Encryption techniques: a theoretical overview and future proposals. In: Third international conference on eDemocracy & eGovernment, pp 60–64
Biswas S, Adhikari S (2015) A survey of security attacks, defenses and security mechanisms in wireless sensor network. Int J Comput Appl 131(17):28–35. https://doi.org/10.5120/ijca2015907654
Kuppuswamy P, Al-Khalidi SQY (2012) Implementation of security through simple symmetric key algorithm based on modulo. Int J Comput Technol 3:335–338
Joshi A, Wazid M, Goudar RH (2015) An efficient cryptographic scheme for text message protection against brute force & cryptanalytic attacks. Procedia Comput Sci 48:360–366
Ismail ES, Baharudin S (2012) Secure hybrid mode-based cryptosystem. Am J Appl Sci 9(3):289–292
Abd Elminaam DS, Abdual Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 10(3):213–219
Singh G, Singla AK, Sandha KS (2011) Throughput analysis of various encryption algorithms. Int J Comput Sci Technol 2(3):527–529
Adamu AA, Wang D, Salau AO, Ajayi O (2020) An integrated IoT system pathway for smart cities. Int J Emerg Technol 11(1):1–9
Shinghe SR, Patil R (2014) An encryption algorithm based on ASCII value. Int J Comput Sci Inf Technol 5(6):7232–7234
Saraswat CK, Sudhakar PT, Biswas P (2016) An extended hybridization of Vigenere and Caeser cipher techniques for secure communication. Procedia Comput Sci 92:355–360
Sukhraliya V, Chaudhary S, Solanki S (2013) Encryption and decryption algorithm using ASCII values with the substitution array approach. Int J Adv Res Comput Commun Eng 2(8):3094–3097
Singh U, Garg U (2013) An ASCII value based text data encryption system. Int J Sci Res Publ 3:1–5
Chatterjee J, Nath SD, Nath A (2011) A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm. In: International conference on communication systems and network technologies, pp 89–94. https://doi.org/10.1109/CSNT.2011.25
Bisht N (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):552–565
Rani N (2015) Suspicious email detection system via triple des algorithm: cryptography approach. IJCSMC 4(5)
Messai M (2014) Classification of attacks in wireless sensor networks. International congress on telecommunication and application, Bejaia, Algeria. Available online https://arxiv.org/ftp/arxiv/papers/1406/1406.4516.pdf
Mathur A (2012) An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. Int J Comput Sci Eng (IJCSE) 4(9):1650–1657
Addagarla SK, Babji Y (2013) A comparative security study review on symmetric key cryptosystem based algorithms. Int J Comput Sci Mob Comput 2(7):146–151
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Salau, A.O., Marriwala, N., Athaee, M. (2021). Data Security in Wireless Sensor Networks: Attacks and Countermeasures. In: Marriwala, N., Tripathi, C.C., Kumar, D., Jain, S. (eds) Mobile Radio Communications and 5G Networks. Lecture Notes in Networks and Systems, vol 140. Springer, Singapore. https://doi.org/10.1007/978-981-15-7130-5_13
Download citation
DOI: https://doi.org/10.1007/978-981-15-7130-5_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7129-9
Online ISBN: 978-981-15-7130-5
eBook Packages: EngineeringEngineering (R0)