Research Paper | Computer Science & Engineering | India | Volume 5 Issue 9, September 2016
An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks
Sindu.B, S. Sathya Priya
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption, consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. This paper attempted to overcome the above two drawbacks. In this proposed design, the base station can recover all sensing data even these data has been aggregated. This property is called recoverable. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks. The proposed work uses the elliptic curve Deffie- Hellman key exchange with RSA for file encryption and decryption and the signature was generated using message digest method namely Digital signature Algorithm. The proposed work was implemented using.Net. Experiment results demonstrate that the transmission overhead is still reduced even if this approach is recoverable on sensing data.
Keywords: RSA, Encryption, Decryption
Edition: Volume 5 Issue 9, September 2016
Pages: 1201 - 1208
How to Cite this Article?
Sindu.B, S. Sathya Priya, "An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=8091601, Volume 5 Issue 9, September 2016, 1201 - 1208
111 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'RSA'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2250 - 2253Survey on Fast and Intelligent Deep Web Crawler Using Machine Learning Approach
Kalyani Thodage
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 759 - 761Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1303 - 1305Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes
N. Laxmi Manasa
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 879 - 882Gauravs Theories and Laws on Programming and Application Development
Gaurav Kumar Roy
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Similar Articles with Keyword 'Decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran