A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN

The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data’s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it’s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.

[1]  Madhumita Panda,et al.  Security in Wireless Sensor Networks using Cryptographic Techniques , 2014 .

[2]  Andrei V. Gurtov,et al.  PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.

[3]  Daehee Kim,et al.  PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[4]  Xiuli Ren Security Methods for Wireless Sensor Networks , 2006, 2006 International Conference on Mechatronics and Automation.

[5]  Howard M. Heys,et al.  Energy efficiency of encryption schemes applied to wireless sensor networks , 2012, Secur. Commun. Networks.

[6]  S. Gajbhiye,et al.  A Survey Report On Elliptic Curve Cryptography , 2011 .

[7]  Monika,et al.  Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks , 2015 .

[8]  Monika Poriye,et al.  Improved Security using DNA Cryptography in Wireless Sensor Networks , 2016 .

[9]  Nitin Jirwan,et al.  Review and Analysis of Cryptography Techniques , 2013 .

[10]  Alaa Hussein Al-Hamami,et al.  Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[11]  Mehran Alidoost Nia,et al.  An Introduction to Digital Signature Schemes , 2014, ArXiv.

[12]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[13]  Zhang Qi ming Secure Digital Certificate Design Based on the Public Key Cryptography Algorithm , 2013 .

[14]  Mohsen Guizani,et al.  PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.

[15]  T. Mandge,et al.  A DNA encryption technique based on matrix manipulation and secure key generation scheme , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[16]  V Vijayalakshmi,et al.  Hybrid Key Management Scheme for Wireless Sensor Networks , 2015 .

[17]  nbspGaurav R. Patel,et al.  Hybrid Encryption Algorithm , 2014 .

[18]  Muhammad Bilal,et al.  Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN) , 2012, ArXiv.

[19]  Swati Sarkar,et al.  An Efficient Implementation of Digital Signature , 2015 .

[20]  Vrijendra Singh,et al.  Securing DNA Information through Public Key Cryptography , 2013 .

[21]  P. Sharma,et al.  Modified RSA Encryption Algorithm (MREA) , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[22]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[23]  Habiba Drias,et al.  An encryption algorithm inspired from DNA , 2010, 2010 International Conference on Machine and Web Intelligence.

[24]  Guozhen Xiao,et al.  New field of cryptography: DNA cryptography , 2006 .

[25]  Rahul Hans,et al.  A Review and Comparative Analysis of Various Encryption Algorithms , 2015 .

[26]  Mahavir Jain Implementation Of Hybrid Cryptography Algorithm , 2014 .

[27]  Yanfeng Wang,et al.  An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.

[28]  Kwok-Wo Wong,et al.  On the security of symmetric ciphers based on DNA coding , 2014, Inf. Sci..

[29]  Nitin Pandey,et al.  Enhancement of security using cryptographic techniques , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).