Downloads: 126 | Views: 301
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 9, September 2016 | Popularity: 6.8 / 10
An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks
Sindu.B, S. Sathya Priya
Abstract: Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption, consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. This paper attempted to overcome the above two drawbacks. In this proposed design, the base station can recover all sensing data even these data has been aggregated. This property is called recoverable. Furthermore, the design has been generalized and adopted on both homogeneous and heterogeneous wireless sensor networks. The proposed work uses the elliptic curve Deffie- Hellman key exchange with RSA for file encryption and decryption and the signature was generated using message digest method namely Digital signature Algorithm. The proposed work was implemented using. Net. Experiment results demonstrate that the transmission overhead is still reduced even if this approach is recoverable on sensing data.
Keywords: RSA, Encryption, Decryption
Edition: Volume 5 Issue 9, September 2016
Pages: 1201 - 1208
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021
Pages: 853 - 859A Brief Survey and Examination of Various Searching Techniques
Cherukuri Nischay Sai