Abstract

Once considered a playground for hackers and malicious attacks, wireless networks are fast becoming more secure than their wired counterparts. Developments in micro electro mechanical systems (MEMS) and wireless networks are opening a new domain in networking history. Recent technological advances in wireless networking, IC fabrication and sensor technology have lead to the emergence of millimetre scale devices that collectively form a Wireless Sensor Network (WSN) and are radically changing the way in which we sense, process and transport signals of interest. They are increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future such as in environmental monitoring, business, and military applications. The huge challenge in WSN is due to inherent resource and computing constraints. Because the sensor nodes are battery powered, increasing the autonomous lifetime of a WSN is a challenging optimization problem. However, deploying new technology, without security in mind has often proved to be unreasonably dangerous. There have been significant contributions to overcome many weaknesses in sensor networks like coverage problems, lack in power and making best use of limited network bandwidth, however; work in sensor network security is still in its infancy stage. The problem of securing these networks emerges more and more as a hot topic. Symmetric key cryptography is commonly seen as infeasible and public key cryptography has its own key distribution problem. In contrast to this prejudice, this paper presents a new symmetric encryption standard algorithm which is the amalgamation of two different encryption algorithms proposed by Nath et. Al namely TTJSA and DJSA algorithms in randomized method. The algorithm is named as Modern Encryption Standard version — I algorithm. The idea of modern encryption standard is to make a symmetric key cryptographic method which should be unbreakable. The MES version-I algorithm is effective against frequency analysis and spectral analysis. Further improvements can be bit level encryption can be performed on the text files after dividing the plaintext into two text files.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call