CFP last date
20 January 2025
Reseach Article

Improved Security using DNA Cryptography in Wireless Sensor Networks

by Monika Poriye, Shuchita Upadhyaya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 13
Year of Publication: 2016
Authors: Monika Poriye, Shuchita Upadhyaya
10.5120/ijca2016912565

Monika Poriye, Shuchita Upadhyaya . Improved Security using DNA Cryptography in Wireless Sensor Networks. International Journal of Computer Applications. 155, 13 ( Dec 2016), 32-35. DOI=10.5120/ijca2016912565

@article{ 10.5120/ijca2016912565,
author = { Monika Poriye, Shuchita Upadhyaya },
title = { Improved Security using DNA Cryptography in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 13 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number13/26668-2016912565/ },
doi = { 10.5120/ijca2016912565 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:11.340477+05:30
%A Monika Poriye
%A Shuchita Upadhyaya
%T Improved Security using DNA Cryptography in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 13
%P 32-35
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure communication and data transmission is necessities in wireless sensor networks and security of sensitive data is the major concern in WSNs. DNA cryptography depicts a crucial part in the area of security. In DNA cryptography, DNA nucleotide bases are used to store huge amount of data. This paper includes a new security technique based on DNA concept that enhance the security of the wireless sensor networks by including false data in original data, which results a DNA sequence in terms of nucleotide bases. Therefore, intruders will not be able to acquire the main encoded information and encounter enough difficulties to cryptanalyst the coded message. This final data (cipher) consist of the extra information i.e. false information with the original message. It would be much difficult to amplify encoded message sequence by the intruder without knowing the correct sequence of cipher.

References
  1. Gilbert, E. P. K., Kaliaperumal, B. and Rajsingh, E. B. 2012 Research Issues in Wireless Sensor Network Applications: A Survey. International Journal of Information and Electronics Engineering. 2, 702-706. DOI: 10.7763/IJIEE.2012.V2.191.
  2. Pathan, A. S. K., Lee, H. W. and Hong, C. S. 2006. Security in Wireless Sensor Networks: Issues and Challenges. ICACT2006, 20-22. DOI: 10.1109/ICACT.2006.206151.
  3. Sharma, G., Bala, S. and Verma, A. K.2012. Security Frameworks for Wireless Sensor Networks-Review. Procedia Technology. 6, 978-987. http://dx.doi.org/10.1016/j.protcy.2012.10.119.
  4. Anwar, T., Paul, D. S. and Singh, S. K. 2014. Message Transmission Based on DNA Cryptography: Review. International Journal of Bio-Science and Bio-Technology, 6, 215-222. http://dx.doi.org/10.14257/ijbsbt.2014.6.5.22
  5. UbaidurRahman, N. H., Balamurugan, C. and Mariappan, R. 2015. A Novel DNA Computing Based Encryption and Decryption Algorithm. Procedia Computer Science, 46, 463 – 475. Doi:10.1016/j.procs.2015.02.045.
  6. Javheri, S. and Kulkarni, R. 2014. Secure Data communication and Cryptography based on DNA based Message Encoding. International Journal of Computer Applications. 98, 35-40. Doi:10.5120/17271-7733.
  7. Saini, N., Pandey,N. and Singh, A. P. 2015.Enhancement of security using cryptographic techniques. 4th International Conference on IEEE, (2015) 1-5. DOI: 10.1109/ICRITO.2015.7359224
  8. Galbreath, N. 2002. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. New York, USA: John Wiley and Sons, Inc., 2002.
  9. Ren, X. 2006. Security Methods for Wireless Sensor Networks. Proceedings of the 2006 IEEE, International Conference on Mechatronics and Automation, 2006, Luoyang, China. 1925-1930.
  10. Sekhar, V. C. and Sarvabhatla, M. 2012. Security In Wireless Sensor Networks With Public Key Techniques. 2012 International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA. 1-16.DOI: 10.1109/ICCCI.2012.6158861.
  11. Singh, G. and Supriya. 2013. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67, 33-38. DOI: 10.5120/11507-7224.
  12. Frunza, M. and Scripcariu, L. 2007. Improved RSA Encryption Algorithm for Increased Security of Wireless Networks. 2007 International Symposium on Signals, Circuits and Systems, Iasi. 1-4. doi: 10.1109/ISSCS.2007.4292737.
  13. Kodali,R. K. and  Sarma, N. V. S. N. 2013. Energy efficient ECC encryption using ECDH. Emerging Research in Electronics, Computer Science and Technology,Lecture Notes in Electrical Engineering, Springer. 248, 471–478. DOI : 10.1007/978-81-322-1157-0_48.
  14. https://ghr.nlm.nih.gov/primer/basics/dna
  15. Mandge, T. and Choudhary, V. 2013. A DNA encryption technique based on matrix manipulation and secure key generation scheme. Information Communication and Embedded Systems (ICICES), 2013 International Conference on, Chennai. 47-52. doi: 10.1109/ICICES.2013.6508181.
  16. Borda, M. and Tornea, O. 2010.DNA secret writing techniques. Communications (COMM), 2010 8th International Conference on, Bucharest. 451-456. doi: 10.1109/ICCOMM.2010.5509086.
  17. https://www.ncbi.nlm.nih.gov/books/NBK26821/, Molecular Biology of the Cell. 4th edition.
  18. Pramanik, S. and Setua, S. K. 2012. DNA cryptography. Electrical & Computer Engineering (ICECE), 2012 7th International Conference on, Dhaka. 551-554. doi: 10.1109/ICECE.2012.6471609
  19. Watson,J. D. and Crick, F. H. C. 1953. Molecular structure of nucleic acids. Nature. 171.4356, 737-738. doi:10.1038/171737a0.
  20. Adelman, L. 1994. Molecular computation of solutions to combinatorial problems. Science in JSTOR. 266,1021–1025. DOI: 10.1126/science.7973651.
  21. Monika and Upadhyaya, S. 2015. Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks. 4th International Conference on Eco-friendly Computing and Communication Systems, Procedia Computer Science. 70, 808 – 813. doi: 10.1016/j.procs.2015.10.121.
Index Terms

Computer Science
Information Sciences

Keywords

DNA cryptography Security WSN Encryption & Decryption