Data Transfer Security solution for Wireless Sensor Network

Bhavin Patel, Neha Pandya
2013 International Journal of Computer Applications Technology and Research  
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for
more » ... ireless sensor networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource time for efficient security aspects. Some basic constraints are most commonly affected in the security mechanism for wireless sensor network: Resource Consumption: WSN has storage, memory and Power limitations. In addition, when implementing a Cryptographic protocol within a sensor the energy impact of Security code must be considered. Energy consumption usually derives from two areas: computational costs and communication costs. Computational cost relates to the cost incurred by calculation of hash functions and primitives while communication cost derives from additional byte transfer among sensor nodes. Usually communication cost is much higher than computational cost. Network Operability: Certainly, unreliable network is another threat to sensor security. The security of the network relies heavily on a defined protocol, which in turn depends on communication. It can be classified in mainly three fields: Unreliable Transfer, Conflicts, and Latency. Normally the packet-based routing of the sensor network is connectionless and thus inherently unreliable.
doi:10.7753/ijcatr0201.1013 fatcat:gtgls3wnlbd2jb3ssudh4w6mme