Research Paper | Computer Science & Engineering | India | Volume 5 Issue 9, September 2016
An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks
Sindu.B, S. Sathya Priya
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption, consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. This paper attempted to overcome the above two drawbacks. In this proposed design, the base station can recover all sensing data even these data has been aggregated. This property is called recoverable. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks. The proposed work uses the elliptic curve Deffie- Hellman key exchange with RSA for file encryption and decryption and the signature was generated using message digest method namely Digital signature Algorithm. The proposed work was implemented using.Net. Experiment results demonstrate that the transmission overhead is still reduced even if this approach is recoverable on sensing data.
Keywords: RSA, Encryption, Decryption
Edition: Volume 5 Issue 9, September 2016
Pages: 1201 - 1208
How to Cite this Article?
Sindu.B, S. Sathya Priya, "An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=8091601, Volume 5 Issue 9, September 2016, 1201 - 1208
111 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'RSA'
Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Survey on Fast and Intelligent Deep Web Crawler Using Machine Learning Approach
Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes
N. Laxmi Manasa
Gauravs Theories and Laws on Programming and Application Development
Gaurav Kumar Roy
Similar Articles with Keyword 'Encryption'
Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Similar Articles with Keyword 'Decryption'
Investigation of Security in Cloud Computing
A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran