CFP last date
20 December 2024
Reseach Article

Comparative Study of Security Algorithms in Wireless Transmissions

by Rajarshi Godse, Jai Lohani, Devanshu Maratha, Tukaram Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 6
Year of Publication: 2017
Authors: Rajarshi Godse, Jai Lohani, Devanshu Maratha, Tukaram Patil
10.5120/ijca2017913894

Rajarshi Godse, Jai Lohani, Devanshu Maratha, Tukaram Patil . Comparative Study of Security Algorithms in Wireless Transmissions. International Journal of Computer Applications. 165, 6 ( May 2017), 31-34. DOI=10.5120/ijca2017913894

@article{ 10.5120/ijca2017913894,
author = { Rajarshi Godse, Jai Lohani, Devanshu Maratha, Tukaram Patil },
title = { Comparative Study of Security Algorithms in Wireless Transmissions },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 6 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number6/27579-2017913894/ },
doi = { 10.5120/ijca2017913894 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:43.914148+05:30
%A Rajarshi Godse
%A Jai Lohani
%A Devanshu Maratha
%A Tukaram Patil
%T Comparative Study of Security Algorithms in Wireless Transmissions
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 6
%P 31-34
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks and wireless sensor networks (WSNs) provide great benefits over the traditional approaches for several applications. These include smart homes, healthcare, environmental monitoring, and homeland security. WSNs can be integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: To efficiently utilize low-power nodes to implement security during data transmission among several sensor nodes. To resolve security issues during data transmission over a long coverage range. Encryption is a vital process to ensure the confidentiality of the information transmitted over the insecure wireless channel. In this paper, a study of various algorithms for secure wireless transmission was performed. To facilitate energy-efficient data encryption, a method based on efficient key generation mechanism was required. The proposed TBSA based system gives an outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some other existing methods.

References
  1. Raj, S. Pravin, and A. Pravin Renold. "An enhanced elliptic curve algorithm for secured data transmission in wireless sensor network." In Communication Technologies (GCCT), 2015 Global Conference on, pp. 891-896. IEEE, 2015.
  2. Prema, G., and S. Natarajan. "An enhanced security algorithm for wireless application using RSA and genetic approach." In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on, pp. 1-5. IEEE, 2013.
  3. Pirbhulal, Sandeep, Heye Zhang, Md Eshrat E Alahi, Hemant Ghayvat, Subhas Chandra Mukhopadhyay, Yuan-Ting Zhang, and Wanqing Wu. "A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network."Sensors 17, no. 1 (2016).
  4. Karsanbha, Gohil Rikitaben, and Mary Grace Shajan. "AES Algorithm for Secured Wireless Communication." In National Conference on Recent Trends in Engineering & Technology, pp. 13-14. 2011.
  5. Katkade, Pradnya, and G. M. Phade. "Application of AES algorithm for data security in serial communication." In Inventive Computation Technologies (ICICT), International Conference on, vol. 3, pp. 1-5. IEEE, 2016
  6. Savitha, S., and S. Yamuna. "Implementation of AES algorithm to overt fake keys against counter attacks." In Computer Communication and Informatics (ICCCI), 2016 International Conference on, pp. 1-5. IEEE, 2016.Plagiarism Check Report.
  7. Alexandru-Corneliu Olteanu*, George-Daniel Oprina*, Nicolae ğăpuú* and Sven Zeisberg,”Enabling mobile devices for home automation using ZigBee”.2013 19th International Conference on Control Systems and Computer Science
  8. Luigi Coppolino , Valerio D’Alessandro , Salvatore D’Antonio , Leonid Lev † and Luigi Romano , “ My Smart Home is Under Attack” 2015 IEEE 18th International Conference on Computational Science and Engineering.
  9. Makkad, Ritu Kaur, and Anil Kumar Sahu. "Novel design of fast and compact SHA-1 algorithm for security applications." In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on, pp. 921-925. IEEE, 2016.
  10. Ratna, Anak Agung Putri, Prima Dewi Purnamasari, Ahmad Shaugi, and Muhammad Salman. "Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple- O authentication based security system." In QiR (Quality in Research), 2013 International Conference on, pp. 99-104. IEEE, 2013.
  11. Bhanot, Rajdeep, and Rahul Hans. "A review and comparative analysis of various encryption algorithms."International Journal of Security and Its Applications 9, no. 4 (2015): 289-306.
Index Terms

Computer Science
Information Sciences

Keywords

Energy efficiency Encryption Decryption AES DES SHA Algorithms.