Comparitive Evaluation of Security Algorithms for Ad Hoc Wireless Networks in an Energy Constrained Environment

Rashid Husain*, Rabia Khan**, Rajesh Kumar Tyagi***
* Department of Mathematics and Computer Science, Sule Lamido University, Kafin Hausa, Jigawa, Nigeria.
** Master of Computer Application, Punjab Technical University, India.
*** Department of Computer Science and Engineering, Amity University, Haryana, India.
Periodicity:July - September'2019
DOI : https://doi.org/10.26634/jwcn.8.2.16788

Abstract

Ad hoc wireless networks are emerging as widely used technology in various domains. Among a diversity of application armed forces use it for sensing and tracking devices, environment monitoring, patient monitoring and tracking intelligent ambiance. Security is important because of its open availability and energy consumption. Hence, it is very challenging to save energy and enhanced security in an wireless sensor network. As the triggered packets promulgate through the network towards final data accession point, it will result in the energy consumption in a low powered network. Therefore the most important aspect of such networks is the energy of the nodes, which directly affects the lifetime of the entire networks. This paper assesses the impact of two secure algorithm such as Tiny Encryption Algorithm (TEA) and Data Encryption Standard (DES) security process on ad hoc wireless network. Hence, number of evaluations are undertaken in the simulator in order to accurately establish energy consumption for above mentioned algorithms. These two algorithms are implemented using Castalia Simulator and compared on parameters, such as available energy, maximum packet size, packet header overhead, frame overhead, routing cost, energy consumed per node, etc. The comparison between the security parameters are graphically plotted with detailed analysis.

Keywords

Cryptographic Algorithm, Security, Energy Consumption, Ad-hoc Wireless Networks, TEA and DES.

How to Cite this Article?

Husain, R., Khan, R., and Tyagi, R. K. (2019). Comparitive Evaluation of Security Algorithms for Ad Hoc Wireless Networks in an Energy Constrained Environment. i-manager’s Journal on Wireless Communication Networks , 8(2), 1-7. https://doi.org/10.26634/jwcn.8.2.16788

References

[1]. Akyildiz, I. F., Su, W., Sankasubramaniam, Y., & Cayirci. E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.
[2]. Anand, M., Cronin, E., Sherr, M., Ives, Z. G., & Lee, I. (2006, July). Sensor network security: More interesting than you think. In Proceedings of the 1st USENIX Workshop on Hot Topics in Security (HOTSEC’06). USENIX Association,USA. (pp.25-30).
[3]. Biryukov, A., & Cannière, C. D. (2005). Data encryption standard (DES). In Henk C. A. van Tilborg (ed.) Encyclopedia of Cryptography and Security. Springer. https://doi.org/10.1007/0-387-23483-7_94
[4]. Burman, S. (2007). Cryptography and security - future challenges and issues. In 15th International Conference on Advanced Computing and Communications (ADCOM 2007) (pp.547 - 551). https://doi.org/10.1109/ ADCOM.2007.141
[5]. Gan, R., Xiao, Y., Shao, J., & Qin, J. (2019). An analysis on optimal attack schedule based on channel hopping scheme in cyber-physical systems. IEEE Transactions on Cybernetics. https://doi.org/10.1109/TCYB.2019. 2914144
[6]. Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., & Sichitiu, M. (2003, September). Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (pp. 151-159). ACM. https://doi.org/10. 1145/941350.941372
[7]. Guimaraes, G., Souto, E., Sadok, D., & Kelner, J. (2004). The Impact of security mechanisms on nodes. In Proceedings of the VI Workshop on Adhoc Wire-less Comunication (WCSF), Fortaleza, Brazil.
[8]. Guimaraes, G., Souto, E., Sadok, D., & Kelner, J. (2005). Evaluation of security mechanisms in wireless sensor networks. Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), (pp. 428-433). IEEE. https://doi.org/10.1109/ ICW.2005.47
[9]. Healy, M., Newe, T., & Lewis, E. (2007, October). Resources Implications for Data Security in Wireless Sensor Network Nodes. In 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007) (pp. 170-175). IEEE. https://doi.org/10.1109/SENSOR COMM.2007.4394916
[10]. Heinzelman, W., R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for ad-hoc wireless microsensor networks, In rd Proceedings 33 Hawaii International Conference on System Sciences (pp. 1-10).
[11]. Law, Y. W., & Havinga, P. J. M. (2005, December). How to secure a wireless sensor network. In 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (pp. 89-95). IEEE. https://doi.org/10.1109/ISSNIP.2005.1595561
[12]. Li, H., Shen, C., Zhao, Y., Sahin, G., Choi, H. A., & Shah, Y. (2019). High entropy secrecy generation from wireless CIR. Journal of Communications and Networks, 21(2), 177-191. https://doi.org/10.1109/JCN.2019.000 019
[13]. Liu, S., Gavrylyako, O. V., & Bradford, P. G. (2004). Implementing the TEA algorithm on sensors. In Proceedings 42nd Annual Southeast Regional Conference, (pp. 64–69). https://doi.org/10.1145/9865 37.986553
[14]. Mini, R. A., Loureiro, A. A., & Nath, B. (2003, September). Prediction-based energy map for wireless sensor networks. In IFIP International Conference on Personal Wireless Communications (pp. 12-26). Springer. https://doi.org/10.1007/978-3-540-39867-7_2
[15]. Pathan, A. S. K.., Lee, H. W., & Hong, C. S. (2006, February). Security in wireless sensor networks: Issues and challenges. In 2006 8th International Conference Advanced Communication Technology (Vol. 2, pp. 1043-1048). IEEE. https://doi.org/10.1109/ICACT.2006. 206151
[16]. Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, J. D. (2001). SPINS: Security protocols for networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, (pp. 1-11).
[17]. Xia, Z., Wang, X., Sun, X., & Wang, Q. (2016). A secure and dynamic Multi-Keyword Ranked Search Scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340-352. https://doi.org/10.1109/TPDS.2015.2401003
[18]. Xiao, M., Wang, X., & Yang, G. (2006). Cross-layer design for the security of wireless sensor networks. Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, China, (pp.104-108).
[19]. Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access, 7, 64366-64374. https:// doi.org/10. 1109/ACCESS.2019.2917299
[20]. Zhong, L. C., Rabaey, J. M., & Wolisz, A. (2004, June). An integrated data-link energy model for wireless sensor networks. In 2004 IEEE International Conference on Communications (Vol. 7, pp. 3777-3783). IEEE. https://doi. org/10.1109/ICC.2004.1313260
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.