A Secure RSA For Data Transmission in Wireless Sensor Networks

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/308916249

A Secure RSA for data transmission in Wireless Sensor Networks

Conference Paper · March 2015

CITATIONS READS

0 794

1 author:

Sheela Sobana Rani


Sri Ramakrishna Institute of Technology
57 PUBLICATIONS   34 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Aggressive and Dominating women and the goddess culture of matriarchy plus those who agree View project

ARTIFICIAL-INTELLIGENCE-AI-GLOBAL-PORTAL View project

All content following this page was uploaded by Sheela Sobana Rani on 07 October 2016.

The user has requested enhancement of the downloaded file.


International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.

A SECURE RSA FOR DATA


TRANSMISSION IN WIRELESS SENSOR
NETWORKS
1
Dr.K.Sheela Sobana Rani, 2R.Abiya Neethu, 3R.Aiswarya, 4S.Archana, 5M.Divya Bharathi
1
Associate Professor, Department of Electronics and Communication Engineering, Sri Ramakrishna Institute of
Technology,Tamil Nadu,India
2345
Student, Department of Electronics and Communication Engineering,Sri Ramakrishna Institute of
Technology,Tamil Nadu,India

ABSTRACT between a source and destination pair, the messages


This paper is based on data transfer in military from the source node may need to wait in the
networks through cipher text-hybrid algorithm. Usage intermediate nodes for a substantial amount of time
of Random Symmetric Algorithm (RSA) is a effective
until the connection would be eventually established.
means of time consumption and data security. In the
Security of data in army stations is an important
existing system retrieval of information is done through
an intermediate node and by providing key mechanism.
issue. In early systems, at the time of information
In the proposed system transfer of the cipher text is transmission between two army stations, it can be
obtained from Random Symmetric Algorithm directly hacked by terrorists, spies and enemies.
from base station to soldiers, thereby minimizing the Cryptography is a very important system employed
time consumed. In addition to it an alert system is also for this purpose. There are various types of
being provided to the soldier. algorithms available for encryption and decryption of
Index terms- the data and new algorithms are evolving.
RSA,encryption,decryption,alert system
Military cryptographic systems must meet number of
practical considerations:

I. INTRODUCTION 1) An ideal cryptographic system for military


purposes is a single all-purpose system which is
Mobile nodes in military environments such as a
practical for use from the highest headquarters to the
battlefield or a hostile region are likely to suffer from
individual soldier on the battlefield. It is secure no
intermittent network connectivity and frequent
matter how much message traffic is sent using the
partitions. Disruption-tolerant Network (DTN)
system. It is easy to use without special training. It
technologies are becoming successful solutions that
presents no logistics problems in keeping the users
allow wireless devices carried by soldiers to
supplied with the system’s keys. It operates under all
communicate with each other and access the
weather conditions, on all means of communication,
confidential information or command reliably by
and in the dark.
exploiting external storage nodes. Some of the most
challenging issues in this scenario are the 2) Cryptographic system selection for military use
enforcement of authorization policies and the policies depends on much more than its degree of security.
update for secure data retrieval. In many military While protecting information from unfriendly eyes, a
networks scenarios, connections of wireless devices system must still allow communications to take place
carried by the soldiers may be temporarily rapidly,to be reliable and to be usable by all who
disconnected by jamming, environmental factors and need to communicate. It must be usable under all
mobility, especially when they operate in hostile conditions. For example, a system requiring an hour
environments. Typically end to end connection of pains-taking encryption would go unused by a

272
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.

combat military force on the move. 3)A system that 3DES and DES. It also shows that 3DES has almost
has no tolerance for errors in its use would be 1/3 throughput of DES, or in other words it needs 3
inappropriate for soldiers under fire in severe weather times than DES to process the same amount of data.
conditions. 4)A system that only supports a low A study in [2] is conducted for different popular
volume of messages would be inappropriate for a secret key algorithms such as RC4, AES, and XOR.
major message centre handling thousands of They were implemented, and their performance was
messages daily. 5) A system that requires expensive, compared by encrypting for real time video streaming
sophisticated equipment would be inappropriate for a of varying contents. The results showed; encryption
military force that can barely afford to buy delay overhead using AES is less than the overhead
ammunition. No single system meets all the using RC4 and XOR algorithm. Therefore, AES is a
requirements of security, speed, reliability, and cost. feasible solution to secure real time video
transmissions. In the present work[3]the authors
The need for security must be balanced against the introduced a new symmetric key cryptographic
practical requirements when systems are selected for method for both encryption and decryption of any file
use. Breakable systems are found today, despite such as binary file text file etc. They considered the
technological advances, because of these practical size of key matrix as 65536 and in each cell they
requirements. Almost any cryptographic system, stored two character patterns instead of one character
given enough time and resources can eventually be with the introduction of a square key matrix of size
solved. The only exception to this is a system which 256x256. In this paper[4], various techniques of
uses absolutely random changing keys with every security of data and one the algorithm using
character encrypted and never repeated. Such a Polyalphabetic substitution cipher are discussed.
system can be achieved under very limited Security of data in army stations is an important
conditions, but is in practice impossible on any large issue. In early systems, at the time of information
scale. Even the most sophisticated machine or transmission between two army stations, it can be
computer based cryptographic system cannot produce hacked by terrorists, spies and enemies.
random, nonrepeating keys. The requirement for each Cryptography is a very important system employed
communicating machine to generate the same keys for this purpose. There are various types of
prevented truly random keys. At best, a machine algorithms available for encryption and decryption of
system can produce keys by so sophisticated a data and new algorithms are evolving. Polyalphabetic
process that it appears to be random and resists substitution cipher is a strong algorithm used for
efforts to recover the key generation process.Given security of data in army stations. The algorithm [5] is
these practical considerations, a military system is designed using combination of two symmetric
expected to delay successful analysis, not prevent it. cryptographic techniques. These two primitives can
When the system is finally solved, the information be achieved with the help of Advanced Encryption
obtained must have lost all its value. Standard (AES) and Data Encryption Standard
(DES). This new hybrid cryptographic algorithm has
II. RELATED WORKS
been designed for better security with integrity. The
A study in [1] is conducted for different secret key security [6] is provided based on the AES prototype
algorithms such as DES, 3DES, AES, and Blowfish. cryptographic algorithm. An advanced key
They were implemented, and their performance was management scheme is used to enhance the security
compared by encrypting input files of varying of the system. The paper presents [7] an approach to
contents and sizes. The algorithms were tested on two develop a Hybrid Cryptographic algorithm using
different hardware platforms, to compare their combination of two symmetric cryptographic
performance. They had conducted it on two different techniques which are AES and DES. In this paper [8]
machines: P-II 266 MHz and P-4 2.4 GHz. The ,Encryption algorithms and methods are among those
results showed that Blowfish had a very good technologies that are less apparent to casual or
performance compared to other algorithms. Also it business users, but are central to virtually every fund
showed that AES had a better performance than transfer, business to business transfer or internal

273
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.

company data input and output today. This paper PROPOSED ALGORITHM FOR KEY
examines evolution and economic significance of GENERATION
NIST’s Data Encryption Standard (DES) program. In
this paper[9] a block encryption standard for transfer 1. Select or create any private key of size
of data is proposed to achieve the different goals of 256x2 bits or 64 characters.
security that is availability confidentiality and 2. Size of the selected key will be varying from
integrity. The algorithm is based on symmetric key 128 bits to 512 bits or 16 to 64 characters.
encryption approach .In this paper[10] the advanced 3. Use of 64*8 key means 512 bits in length.
encryption standard is used for error detection in an 4. Divide 64 bytes into 4 blocks of 16 bytes
efficient manner .hardware implementation can be like Key_Block1, Key_Block2,
done in the most efficient and appropriate manner. Key_Block3, Key_Block4.
5. Apply XOR operation between Block1 and
Block3.Results will be stored in new
III. PROPOSED SYSTEM Key_Block13.
6. Apply XOR operation between Block2 and
In this paper we propose an improved block Block13.results will be stored in new
cipher symmetric encryption algorithm that has the Key_Block213.
same structure of encryption and decryption. So far, 7. Apply XOR operation between
conventional cryptography algorithms have Key_Block213 and Key_Block4.Results
difference structure of encryption and decryption. We will be stored in new Key_Block4213.
device our algorithm by inserting a symmetric layer 8. Repeat the steps 5,6,7 till (random
using random number, encryption number and XOR number/4).
operation, in which the whole proposed algorithm 9. Exit.
rounds uses encryption procedure and the same for
the decryption procedure. The symmetry layer is put
between encryption part and the decryption one. The
proposed algorithm has the better speed compared
with the comparing encryption algorithm. The main
feature of the encryption/decryption program
implementation is the generation of the encrypted
key. The purpose of the cryptography is used not
only to provide confidentiality, but also to provide
solutions for other problems such as data integrity,
authentication, non-repudiation.In this a random
number for generating the initial key, where this key
will be used for encrypting the given source file using
proposed encryption algorithm with the help of
encryption number. The proposed key blocks
contains all the possible words comprising of
number(n) of characters each generated from all
characters whose ASCII code is from 0 to 255 in a
random order. The pattern of the key blocks will
depend on the text key entered by the user. Here we
are using 512 bit key size to encrypt a text message.
To decrypt any file one has to know exactly what the
key blocks is and to find the random blocks
theoretically one has to apply 2^256 trial run which is
intractable. As proposed earlier we are using a
symmetric key approach in our system. Fig 1.1 Block diagram for the key generation

274
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.

ALGORITHM FOR THE ENCRYPTION The Fig1.4 shows that the input texts are being
PROCESS scanned for the encryption to take place. The
condition of the switches is scanned for inputs and
1. Initially select the plane text of 16 bytes following encryption process done. The simulation
2. Insert the key of size 16 bytes(depend on the results in Fig 1.5 shows that the transmission of the
plane text value) input text to the receiver side.
3. Apply XOR operation between the
key(Key_Block4213) and plane text block
(Text_Block). Results will be stored in
Cipher_Block1.
4. Apply right circular shift with 3 values. will be
stored in new Cipher_Block2.
5. Apply XOR operation between Cipher_Block2
and Key_Block2.Result will be stored in new
Cipher_Block4.
6. Cipher_Block4 is the input of the next round as a
plane text block.
7. Repeat step 1 to 7 till (Encryption number /4).
8. Exit.

Fig 1.3 Simulation for scanning keys

Fig 1.2 Block diagram for the encryption process

IV. RESULTS AND SIMULATION

The following results were obtained from the


PROTEUS MODELING describing the encryption
and decryption algorithm of our proposed system.
The simulation results Fig1.2 describes about the Fig 1.4 Simulation for input text
initial condition where the input texts are given encryption
manually.

275
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.

Algorithm using extended MSA method: DJSA symmetric


key algorithm” published in 2011 International Conference
on Communication Systems and Network Technologies,
978-0-7695-4437-3/11 $26.00 © 2011 IEEE

[4] Dnyanda Namdeo Hire, “Secured Wireless Data


Communication”, International Journal of Computer
applications(09758887),Volume54no1,September 2012.

[5] Wang Tianfu, K. Ramesh Babu , VIT University,


TamilNadu,India.”Design of a Hybrid Cryptographic
Algorithm”.K Ramesh Babu, International Journal of
Computer Science & Communication Networks,
ISSN:2249-5789 , Vol 2(2), 277-283 277

[6] Nikolaos Doukas,Nikolaos G.Bardis, wseas transactions


on information science & applications, “Design and
Development of a Secure Military Communication based
on AES Prototype Crypto Algorithm and Advanced Key
Management Scheme”,ISSN: 1790-0832, Issue 10, Volume
5, October 2008
Fig 1.5 Simulation result showing the transmission
of the input text [7] Jigar Chauhan, Neekhil Dedhia, Bhagyashri Kulkarni,
University of Mumbai. “Enhancing Data Security by using
Hybrid Cryptographic algorithm”, International Journal of
Engineering Science and Innovative Technology (IJESIT)
Volume 2, Issue 3, May 2013

[8] D. Coppersmith, "The Data Encryption Standard (DES)


and Its Strength against Attacks." IBM Journal of Research
V. CONCLUSION and Development,May 1994, pp. 243 -250.

Cryptography is the best method for security of data. [9] Akhil Kaushik, Manoj Bamela, AnantKumar, ” Block
The proposed RSA shows a better result when Encryption Standard for Transfer of Data”, International
compared with the previous works. It will take less Conference on Networking and Information Technology-
time and it is impossible to break the encryption 2010.
algorithm without knowing the exact key value. This
[10] H. Yen, B. F. Wu,“Simple error detection methods for
algorithm can be applied for data encryption and
hardware implementation of advanced encryption
decryption in any type of public applications for standard”,IEEE Trans. Computers, Vol. 55, No. 6, pp. 720-
sending confidential data. 731, June2006.

VI.REFERENCES

[1] "A Performance Comparison of Data Encryption


Algorithms," IEEE [Information and Communication
Technologies, 2005. ICICT 2005. First International
Conference ,2006-02-27, PP. 84- 89.

[2] W.S.Elkilani, H.m.Abdul-Kader, "Performance of


Encryption Techniques for Real Time Video Streaming, Dr.K.Sheela Shobana Rani, Associate professor,Sri
IBIMA Conference, Jan 2009, PP 1846-1850. Ramakrishna Institute of Technology,Coimbatore, has 10.5
years experience in teaching, has published papers in 16
[3] Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, journals and in 20 conferences
Asoke Nath “A new Symmetric key Cryptography

276
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.

M. Divya Bharathi, pursuing B.E in ELECTRONICS AND


COMMUNICATION ENGINEERING, Sri Ramakrishna
Institute of Technology, Coimbatore, have attended a
workshop on “ARDUINO MICROCONTROLLER” at Sri
Ramakrishna Institute of Technology and attended a
conference on “ ADVANCED TRENDS IN
COMMUNICATION ENGINEERING” at Sri Ramakrishna
R. Abiya Neethu, pursuing B.E in ELECTRONICS AND Institute of Technology. A member of ISTE (Indian Society
COMMUNICATION ENGINEERING, Sri Ramakrishna for Technical Education).
Institute of Technology, Coimbatore, have attended a
workshop on “ARDUINO MICROCONTROLLER” at Sri
Ramakrishna Institute of Technology and attended a
conference on “ ADVANCED TRENDS IN
COMMUNICATION ENGINEERING” at Sri
Ramakrishna Institute of Technology. A member of ISTE
(Indian Society for Technical Education).

R. Aiswarya, pursuing B.E in ELECTRONICS AND


COMMUNICATION ENGINEERING, Sri Ramakrishna
Institute of Technology, Coimbatore, have attended a
workshop on “ARDUINO MICROCONTROLLER” at Sri
Ramakrishna Institute of Technology and attended a
conference on “ ADVANCED TRENDS IN
COMMUNICATION ENGINEERING” at Sri Ramakrishna
Institute of Technology. A member of ISTE (Indian Society
for Technical Education).

S.Archana, pursuing B.E in ELECTRONICS AND


COMMUNICATION ENGINEERING, Sri Ramakrishna
Institute of Technology, Coimbatore, have attended a
workshop on “ARDUINO MICROCONTROLLER” at Sri
Ramakrishna Institute of Technology and attended a
conference on “ ADVANCED TRENDS IN
COMMUNICATION ENGINEERING” at Sri Ramakrishna
Institute of Technology. A member of ISTE (Indian Society
for Technical Education).

277

View publication stats

You might also like