INFORMATION CHANGE THE WORLD

International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.6, No.8, Jul. 2014

Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes

Full Text (PDF, 405KB), PP.32-42


Views:89   Downloads:2

Author(s)

Er. Gurjot Singh, Er. Sandeep Kaur Dhanda

Index Terms

QoS, Cryptography, ANODR, IPSec, ISAKMP, WSN`s

Abstract

A Wireless Sensor Network is a combination of spatially distributed independent nodes deployed in dense environment, communicating wirelessly over limited bandwidth and frequency. Security and Qos is the major concern in wireless sensor network due to its wireless communication nature and constraints like low computation capability, less memory, bounded energy resources, susceptibility to physical capture or damages and the use of insecure wireless communication channels. These constraints make security along with the QoS, a challenge in wireless sensor network. The cryptographic schemes increases the level of security and make it secure against critical attacks but also has a significant impact on the QoS of wireless sensor network. In this paper, the different cryptographic schemes based on asymmetric key and symmetric key cryptography are evaluated. The symmetric key cryptography schemes require less time for processing, less power and also require less storage space as compared to asymmetric key cryptographic schemes, results in less impact on the QoS of wireless sensor network. In this paper, the QoS of wireless sensor network along with cryptographic schemes will be evaluated on the basis of metrics like throughput, jitter, end-to-end delay, total packet received and energy consumption.

Cite This Paper

Er. Gurjot Singh, Er. Sandeep Kaur Dhanda,"Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.8, pp.32-42, 2014. DOI: 10.5815/ijitcs.2014.08.05

Reference

[1]Granjal Jorge, Monteiro Edmundo and Silva Jorge Sa,“A secure interconnection model for IPv6 enabled Wireless Sensor Networks”, IEEE, pp. 1-6, 2010.

[2]Johnson M., Healy M., Van de Ven P., Hayes M., Nelson J., Newe T. and Lewis E., “A Comparative Review of Wireless Sensor Network Mote Technologies”, IEEE Sensors, 2009.

[3]Chaudhari H.C. and Kadam L.U., “Wireless Sensor Networks: Security, Attacks and Challenges”, International Journal of Networking, Vol. 1, No. 1, pp. 4-16, 2011.

[4]Gurjot Singh and Sandeep Kaur Dhanda, “Performance Analysis of Security Schemes in Wireless Sensor Network”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue. 8, pp. 3217- 3223, 2013.

[5]Granjal Jorge, Monteiro Edmundo and Silva Jorge Sa, “Enabling network-layer security on Ipv6 Wireless Sensor Networks”, IEEE Globecom pp. 12- 18, 2010.

[6]Dr. Jain Kumar Manoj, “Wireless Sensor Networks: Security Issues and Challenges”, IJCIT, Vol. 2, No. 1, pp. 62-67, 2011.

[7]Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, Journal of Information Security, vol. 2, pp. 69- 84, 2011.

[8]Dadarlat Vasile, “WSeH: Proposal for an Adaptive Monitoring Framework for WSNs, with Enhanced Security and QoS Support”, IEEE, pp. 7-12, 2012.

[9]M. Yigitel Aykut, Incel Ozlem Durmaz, Ersoy Cem, “QoS-aware MAC protocols for wireless sensor networks: A survey”, Elsevier- Computer Networks, 55, pp. 1982- 2004, 2011.

[10]P. Rajan and S. Varatha Rajan, “Network Supporting Multilayered Quality of Service Routing in Wireless Sensor Networks” PROCEEDINGS OF ICETECT- IEEE, PP. no. 1016- 1025, 2011. 

[11]Raza Shahid, Chung Tony, Duquennoy Simon, Yazar Dogan, Voigt Thiemo and Roedig Utz, “Securing Internet of Things with Lightweight IPsec”, SICS, Vol. 8, pp. 1-26, 2011.

[12]Dr. Padmavathi G., Dr. Subashini P. and Devi Aruna D., “DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network”, International Journal of Network Security & Its Applications (IJNSA), Vol. 4 No. 1, pp 69-76, 2012.

[13]Garcıa-Otero Mariano and Poblacion-Hernandez Adrian, “Secure Neighbor Discovery in Wireless Sensor Networks Using Range-Free Localization Techniques”, International Journal of Distributed Sensor Networks, Vol. 5, pp. 1-12, 2012.

[14]Devi Aurna D. and Subashini P., “SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV against Denial of Service attack for MANET in Military Scenario”, International Journal of Computer Applications, Vol. 48, No. 4, pp. 1-6, 2012.

[15]Ramannavar Manjila M. and Jagtap Monica M., “Authentication in Wireless Sensor Networks Using Virtual Certificate Authorities”, International Journal of Emerging Technology and Advanced Engineering , Volume 2, No. 11, pp. 81-85, 2012.

[16]Sen Jaidip, “A Survey on Wireless Sensor Network Security”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, pp. 55- 78, 2009.

[17]Kahate Atul, “Cryptography and network security”, The Tata Mcgraw- hill, 2003.

[18]Kong Jiejun and Hong Xiaoyan, “ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks”, ACM, 2004.

[19]Alwan Hind and Agarwal Anjali, “A Secure mechanism for QOS routing in wireless sensor networks”, IEEE, 2012.

[20]Yang Loong Mee, Al-Anbuky Adnan and William Liu, “A Fast and Efficient Key Agreement Scheme for Wireless Sensor Networks”, International Conference on Wireless and Mobile Communications, Vol. 5, pp. 231-237, 2012.

[21]Yu Zhang, “The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security”, IEEE, pp. 626-629, 2012.

[22]Bhuyan Bhaskar, Deva Sarma Kumar Hiren, Sarma Nityananda, Avijit Kaur Avijit and Mall Rajib, “Quality of Service (QoS) Provisions in Wireless Sensor Networks and Related Challenges”, Wireless Sensor Network- Scientific research, no. 2, pp. 861- 868, 2010.