Efficient Hybrid Method for Intrinsic Security Over Wireless Sensor Network

Secrecy communication is promising particularly for wireless systems due to the transmission environment of the radio path, which is simply interrupted. Wireless security methods have classically improved for conventional wireline applications, and these techniques are not assumed substantial properties of the wireless channels. To overcome these problems, in this research work a foundation was developed to introduce and examine the wireless networks inhibiting confidentiality presented via node spatial distribution, wireless propagation medium and combined network interference. This work proposed an approach, called as blowfish algorithm and secure hash algorithm (SHA), for the security which are inner qualities. Blowfish, a 64-bit symmetric block cipher which utilizes a key having the variable length from 32 bits to 448 bits, includes 16 rounds and produces the key-dependent S-boxes. It is faster speed for the procedure of encryption/decryption of group communication information from the given network. A hybrid method blowfish with SHA is proposed in this work to improve the security for ensuring secrecy from the eavesdroppers. It is used to ensure the higher security in terms of reliability and security in the given network by using efficient cryptography algorithm. The result shows that the formulated system produces higher efficiency in terms of better security rather than the existing system. The proposed hybrid BF + SHA algorithm provides higher ratio of packet delivery, average delay and throughput than the existing system.

[1]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[2]  M. Sudha Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography , 2012, CSA 2012.

[3]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[4]  V. Ramaswamy Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect , 2008 .

[5]  Moe Z. Win,et al.  Intentional Network Interference for Denial of Wireless Eavesdropping , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[6]  Bhalaji N. Dr PERFORMANCE EVALUATION OF FLYING WIRELESS NETWORK WITH VANET ROUTING PROTOCOL , 2016 .

[7]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Jian Shen,et al.  Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.

[9]  Simon Pietro Romano,et al.  A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[11]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[12]  Zhong Ming,et al.  An Intelligent Wireless Sensor Networks System with Multiple Servers Communication , 2015, Int. J. Distributed Sens. Networks.

[13]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[14]  Amir Ghasemi,et al.  Interference Aggregation in Spectrum-Sensing Cognitive Wireless Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[15]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .