A Technique to Resolve Data Integrity and Confidentiality Issues in a Wireless Sensor Network

被引:0
|
作者
Kumar, Sunil [1 ]
Krishna, C. Rama [2 ]
Solanki, A. K. [3 ]
机构
[1] IK Gujral Punjab Tech Univ, Kapurthala, Punjab, India
[2] NITTTR, Dept Comp Sci & Engn, Chandigarh, India
[3] BIET, Dept Comp Sci & Engn, Jhansi, Uttar Pradesh, India
关键词
Wireless Sensor Network; Security; data integrity; confidentiality; AUTHENTICATION; AGGREGATION; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security in WSN infrastructure is the ability to transmit electronic data from source to destination so that only intended recipients can receive the actual data without compromising its integrity and losing its confidentiality throughout the entire transmission process. The use of standard public or private key cryptographic techniques can solve various confidentiality issues such as they can prevent various security attacks. The establishment of key in WSN can also be done with the help of protocols where after the deployment, sensor nodes set up a common secret key either through agreement of key or through key transport. In this paper, a hybrid technique has been proposed which can resolve data integrity and confidentiality issues with higher time and space efficiencies along with time-efficient key management and source as well as data validation system. This research is using simulation of all these blueprint technique to check their performances. The implementation is done on the java platform and all the data transmissions are performed in the wireless sensor environment. The performances of various techniques have been analyzed in terms of produced results. The proposed technique is further compared with different standard and existing techniques to show their efficiency rather than the rest.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 50 条
  • [1] Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
    Bista, Rabindra
    Kim, Yong-Ki
    Song, Myoung-Seon
    Chang, Jae-Woo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 67 - 77
  • [2] Energy Efficient, Integrity Preserving and Secure Data Aggregation Technique for Wireless Sensor Network
    Pradhan, Shrijana
    Sharma, Kalpana
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 43 - 52
  • [3] Implementation of data confidentiality for providing High Security in Wireless Sensor Network
    Ghormare, Sneha
    Sahare, Vaishali
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [4] Deployment of Data Aggregation Technique in Wireless Sensor Network
    Patel, Rutusha
    Kanawade, Shailaja
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1, 2017, 468 : 675 - 680
  • [5] Data Clustering Technique for In-Network Data Reduction in Wireless Sensor Network
    Alam, M. K.
    Abd Aziz, Azrina
    Latif, S. A.
    Awang, Azlan
    [J]. 2019 17TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2019, : 317 - 322
  • [6] Issues of Data Aggregation Methods in Wireless Sensor Network: A Survey
    Sirsikar, Sumedha
    Anavatti, Samarth
    [J]. PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 : 194 - 201
  • [7] An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks
    Zhu, Liehuang
    Yang, Zhen
    Xue, Jingfeng
    Guo, Cong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [8] Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks
    Cui, Jie
    Shao, Lili
    Zhong, Hong
    Xu, Yan
    Liu, Lu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 1022 - 1037
  • [9] Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks
    Jie Cui
    Lili Shao
    Hong Zhong
    Yan Xu
    Lu Liu
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 1022 - 1037
  • [10] Authenticated Data Transmission Technique for Clustered Wireless Sensor Network
    Tripathy, Asis Kumar
    Chinara, Suchismita
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 744 - +