Open Access Open Access  Restricted Access Subscription Access

Analyzing Energy Consumption by Cryptographic Techniques for Secure Communication in Underwater Wireless Sensor Networks


Affiliations
1 IT iNurture Education Solutions pvt. ltd. Bangalore, India
2 Department of Electronics and Communication Engineering, Mody University of Science and Technology, Lakshmangarh, Sikar, Rajasthan-332311, India
 

   Subscribe/Renew Journal


Underwater Wireless Sensor Networks comprise of a spread of acoustic sensors or nodes deployed in a geographical area of interest under the sea or ocean. The nodes on capturing data from the particular region send it to a central processing point. Due to the characteristics of underwater channel, these types of senor networks are vulnerable to malicious attacks. Being battery powered, energy is an important and critical factor to be considered for underwater sensor networks, along with maintaining the security of data. This paper aims at analyzing the energy consumed by cryptographic algorithms, applied in routing data in a clustered manner, in this category of wireless sensor networks.

Keywords

Acoustic, Asymmetric Key Cryptography, Base Station, Cluster Head, Security, Sensor Node, Symmetric Key Cryptography.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Das Anjana P., Sabu M. Thampi. “Secure communication in mobile underwater wireless sensor networks” International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, IEEE.
  • Akyildiz Ian F., Dario Pompili, Tommaso Melodia. “Underwater acoustic sensor networks: research challenges” Ad hoc networks, vol. 3(3), 2005, pp. 257-279.
  • Kim J. E., Yun N. Y., Muminov S., Park S. H., Yi O. Y. “Security in underwater acoustic sensor network: focus on suitable encryption mechanisms” AsiaSim 2012, pp. 160-168.
  • Sozer Ethem M., Milica Stojanovic, John G. Proakis. “Underwater acoustic networks” IEEE Journal of Oceanic Engineering, vol. 25(1), 2000, pp. 72-83.
  • Mamalis Basilis, et al. “Clustering in wireless sensor networks” RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, Y. Zhang, LT Yang, J. Chen, eds, 2009, pp. 324-353.
  • https://community.jisc.ac.uk/library/advisoryservices/introduction-cryptographic-techniques
  • G. Guimaraes, E. Souto, D. Sadok and J. Kelner, “Evaluation of security mechanisms in wireless sensor networks” Proceedings Systems Communications, vol. 1(1), 2005, IEEE, pp. 428-433.
  • G. Padmavathi, D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks” International Journal of Computer Science and Information Security, vol. 4(1-2), 2009, pp.315-321.
  • M. Marine, C. Raphael, W. Phan. “Energy-efficient cryptographic engineering paradigm” Open Problems in Network Security, vol. 1(1), 2012, Springer, pp.78-88.
  • R. L. Rivest, A. Shamir, L. Adleman. “A method for obtaining digital signatures and public-key cryptosystems” Communications of the ACM, vol. 21(2), 1978, pp. 120–126.
  • Desmond J. Higham, Nicholas J. Higham. “MATLAB guide” Siam, 2005.
  • “RSA Laboratories - TWIRL and RSA Key Size” emc.com. Retrieved September 2016.

Abstract Views: 369

PDF Views: 142




  • Analyzing Energy Consumption by Cryptographic Techniques for Secure Communication in Underwater Wireless Sensor Networks

Abstract Views: 369  |  PDF Views: 142

Authors

Sheena Kohli
IT iNurture Education Solutions pvt. ltd. Bangalore, India
Partha Pratim Bhattacharya
Department of Electronics and Communication Engineering, Mody University of Science and Technology, Lakshmangarh, Sikar, Rajasthan-332311, India

Abstract


Underwater Wireless Sensor Networks comprise of a spread of acoustic sensors or nodes deployed in a geographical area of interest under the sea or ocean. The nodes on capturing data from the particular region send it to a central processing point. Due to the characteristics of underwater channel, these types of senor networks are vulnerable to malicious attacks. Being battery powered, energy is an important and critical factor to be considered for underwater sensor networks, along with maintaining the security of data. This paper aims at analyzing the energy consumed by cryptographic algorithms, applied in routing data in a clustered manner, in this category of wireless sensor networks.

Keywords


Acoustic, Asymmetric Key Cryptography, Base Station, Cluster Head, Security, Sensor Node, Symmetric Key Cryptography.

References