Skip to Main Content
Security is one of the major issue for the ubiquitous sensor networks' (USNs) applications. The evolution of ubiquitous sensor networks provides a unique solution for many ubiquitous information services. Apparently, it challenges the data security and secrecy due to its hostile deployment which is not robust to physical attacks from restricted sources. In order to resolve, the security issue that are duly required in sensor networks, the cryptography protocol is implemented at sensor nodes for node-to-node encryption, considering the data redundancy, energy constraint and security requirement. In this paper, we analyze secure data aggregation scheme and compare its performance with upgraded results of secure protocol called Dragon-Mac, which supports node-to-node encryption using Dragon algorithm based on secrecy methods in sensor networks. This procedure utilizes the entity verification and message authentication through the performance of authenticated encryption scheme in Telos B wireless sensor nodes.
Date of Conference: 25-27 Aug. 2009