By Topic

A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Pardeep Kumar ; Dept. Ubiquitous IT, Dongseo Univ., Busan, South Korea ; Hoon Jae Lee

Security is one of the major issue for the ubiquitous sensor networks' (USNs) applications. The evolution of ubiquitous sensor networks provides a unique solution for many ubiquitous information services. Apparently, it challenges the data security and secrecy due to its hostile deployment which is not robust to physical attacks from restricted sources. In order to resolve, the security issue that are duly required in sensor networks, the cryptography protocol is implemented at sensor nodes for node-to-node encryption, considering the data redundancy, energy constraint and security requirement. In this paper, we analyze secure data aggregation scheme and compare its performance with upgraded results of secure protocol called Dragon-Mac, which supports node-to-node encryption using Dragon algorithm based on secrecy methods in sensor networks. This procedure utilizes the entity verification and message authentication through the performance of authenticated encryption scheme in Telos B wireless sensor nodes.

Published in:

INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on

Date of Conference:

25-27 Aug. 2009