Performance Evaluation of Symmetric Cryptographic Algorithms in resource constrained hardware for Wireless Sensor Networks

Abstract : Wireless sensor networks (WSN) allow to exchange information and to take immediate and remote actions in natural, industrial, military or domestic environment systems. These networks are vulnerable to cyber-attacks, hence, they are vulnerable to being intercepted, interrupted or modified. However, for the last twenty years, the amount of information exchanged through communication networks around the world has considerably increased and thus its vulnerability. As a result, encryption algorithms are fundamental to protect information. In this context, security, performance and energy consumption become a paramount design factor for an engineer when designing and implementing WSNs. It is not an easy task to reach an optimal balance between these factors. In this paper, we evaluate three well-known symmetric encryption algorithms in an embedded development platform: the ARDUINO MEGA 2560. Our experiment measures the algorithms encryption average execution time and energy consumption. Additionally, we measure the impact of the channels of a small wireless sensor network with two nodes. The evaluation demonstrates the feasibility of implementing cryptographic algorithms in devices with limited resources such as memory, computing power and life span (energy consumption). Furthermore, the low impact on the network channels when comparing unencrypted communication vs encrypted communication evidence the potential of symmetric encryption algorithms.
 EXISTING SYSTEM :
 ? All the nodes try to transmit data towards the sink node, which is vulnerable to attack by intruders hence threat always exist in WSN. ? Data integrity in sensor networks is expected to make certain the reliability and quality of the data and insinuates back to the sender that the data is not tempered. ? It ensures that a given message can't be comprehended by method for everyone separated from the well-known recipients. ? It ensures that the data during transmission in WSN remain intact and not been spoofed throughout the transmission. ? In order to ensure the data integrity symmetric or asymmetric transmission mechanisms is used, in which both sender and receiver share the same secret keys.
 DISADVANTAGE :
 ? A performance evaluation over constrained platforms of more sophisticated modes like authenticated encryption is relevant since they present significant impact on energy consumption compared to ECB. ? Moreover, the structures within each framework can also adopt different project and implementation approaches, using different policies of processing or memory usage. Modifications in operating system components (in the case of MiniSec) are an even more complex issue. ? EAX and OCB are standardized, and OCB has some patent issues. ? We provide time and energy benchmarks of reference implementations for different platforms and operating systems and analyze their impact.
 PROPOSED SYSTEM :
 • In, a privacy-preserving outsourced calculation toolkit was proposed for Cloud-based IoT. • In the proposed architecture two PAN configuration was considered, one which is responsible for communication between sensor node and access point(AP) and other forming backbone network between access point and coordinator node. • In proposed methodology, detail considerations of these algorithms are show the effectiveness of the algorithm. • We have studied various algorithms for this purpose, but we have taken only four prominent algorithms for comparison, in our research work because of their extensive use and limitations of another algorithm for implementing in WSN.
 ADVANTAGE :
 ? A new requirement is thus introduced, and security solutions should take those richer environments into account while still offering acceptable performance and energy footprints among all devices within a network. ? The performance evaluation is usually done by direct compilation to the target platform without an underlying OS. ? They also do not address the performance behavior when operating systems also play a role. ? It is worth pointing out that a usual good approach for comparing performance of different algorithms is that the same implementor implements all of them since the same amount of tricks is more evenly applied.

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com