Open Access
Subscription Access
Open Access
Subscription Access
Efficient Security for Data Communication in Wireless Sensor Networks Using Raspberry PI
Subscribe/Renew Journal
Information technology finds its wide application in many fields like healthcare, border security etc. where security of information is very important. With advancement in wireless sensor networks, gathering and processing of data have become much easier and affordable, due to its wide application, providing security to data is required. This work proposes a prototype that uses Raspberry Pi as secure sensor node that performs both regular encryption and XML encryption to provide security to the data collected by sensor nodes and transmit it to the master node in the WSN. The design uses a temperature sensor which can be replaced by any other sensor going forward and can be used in the field of healthcare, border security, and many other areas. The data are collected, processed, encrypted, and wirelessly communicated to the master node. Since there is direct interfacing between the sensor and Raspberry Pi, there is no risk of data loss. The idea of this paper is to meet the goal of comparing the two encryption techniques in terms of processing time and number of characters and to see which is better in terms of both the parameters.
Keywords
Wireless Sensor Networks, Temperature-Sensor, Raspberry Pi, XML Encryption.
Subscription
Login to verify subscription
User
Font Size
Information
- Alajmi, N. (2014). Wireless sensor networks attacks and solutions. International Journal of Computer Science and Information Security, July, 12(7), 1-4.
- Anand, D. G., Chandrakanth, H. G., & Giriprasad, M. N. (2012). Security threats & issues in wireless sensor networks. International Journal of Engineering Research and Applications, 2(1), 911-916.
- Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of NextGeneration Networks, 1(1), 1-10.
- Maurya, M., & Shukla, S. R. (2013). Current wireless sensor nodes (Motes): Performance metrics and constraints. International Journal of Advanced Research in Electronics and Communication Engineering, 2(1), 0-45.
- Miyauchi, K. (2005). XML signature/encryption- The basis of web service security. NEC Journal of Advanced Technology, 2(1), 35-39.
- Panda, M. (2014). Security in wireless sensor networks using cryptographic techniques. American Journal of Engineering Research, 3, 50-56.
- Raspberry Pi. (2015). What is Raspberry Pi? Retrieved from https://www.raspberrypi.org/community/
- Vujovic, V., & Maksimovic, M. (2014). Raspberry Pi as a Wireless Sensor Node: Performances and constraints. In 37th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO), (pp. 1013-1018).
- W3C Recommendation (11 April 2013). XML Encryption Syntax and Processing Version 1.1. Retrieved fromhttp://www.w3.org/TR/xmlenc-corel
Abstract Views: 409
PDF Views: 0