Light weight encryption algorithms for wireless body area networks

  • Authors

    • CH Radhika Rani
    • Lakku Sai Jagan
    • Ch Lakshmi Harika
    • V V. Durga Ravali Amara
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.11754
  • WBAN, security, lightweight encryption algorithms, Blowfish.
  • Wireless Body Area Network (WBAN) emerges as a major network in today’s world. WBAN comprise of sensors used for applications like health monitoring, military, etc. These sensors are embedded within or out of the body. Security is a major factor in WBAN’s and hence it is essential to provide security for patient’s data. So we study about various encryption algorithms in this paper to provide                 security. The WBAN comprise of body sensors in which the energy resources are limited and since consumption of energy will be more it is essential to go for light weight algorithms to provide security and decrease energy consumption.

     

     

  • References

    1. [1] Daojing SC & Shaohua, A Novel and a Lightweight System to Secure Wireless Health Sensor Networksâ€, IEEE Journal Of Biomedical AndHealth Informatics, Vol.18, No.1, (2014), pp.23-32.

      [2] Trcek, D & Brodnik A, “Hard and soft security provisioning for computationally weak pervasive computing systems in e-healthâ€, IEEE Wireless Communications, Vol.20, No.4,(2013), pp.22-29.

      [3] Surya E & Divya C, “A Survey on Symmetric Key Encryption Algorithmsâ€, International Journal of Computer Science & Communication Networks, Vol.2, No.4, (2012), pp.475-477.

      [4] Coppersmith D, “The Data Encryption Standard (DES) and its strength against attacksâ€, IBM journal of research and development, Vol.38, No.3, (1994), pp.243-250.

      [5] Nie T & Zhang T, “A study of DES and Blowfish encryption algorithmâ€, IEEE Region 10 Conference Tencon,(2009), pp.1-4.

      [6] Manap C & Kara O, “A novel class of weak keys for blowfish algorithmâ€, Fast Software Encryption, (2007), pp.167-180.

      [7] Nakahara J, “A linear analysis of Blowfish and Khufuâ€, International Conference on Information Security Practice and Experience, (2007), pp.20-32.

      [8] Nadeem A & Javed MY, “A performance comparison of data encryption algorithmsâ€, First international conference on Information and communication technologies, (2005), pp.84-89.

      [9] Schneier B, “Description of a new variable-length key, 64-bit block cipher (Blowfish)â€, International Workshop on Fast Software Encryption, (1993), pp.191-204.

      [10] DES federal Information Processing Standards Publication 1981 and the Guidelines for Implementing and Using the Nbs Data Encryption Standard Uspateent 3798359: Block cipher Cryptographic SystemFiestel: Horst, Mar. 19,1974.

      [11] Agrawal H & Sharma M, “Implementation and analysis of various symmetric cryptosystemsâ€, Indian Journal of science and Technology, Vol.3, No.12,(2010), pp.1173-1176.

      [12] Saleem S, Ullah S & Yoo HS, “On the security issues in wireless body area networksâ€, JDCTA, Vol.3, No.3,(2009), pp.178-184.

      [13] Durresi A, Paruchuri V, Kannan R & Iyengar SS, “A lightweight protocol for data integrity in sensor networksâ€, Proceedings of the Intelligent Sensors, Sensor Networks and Information Processing Conference, (2004), pp.73-77.

      [14] Kamel I & Juma H, “A lightweight data integrity scheme for sensor networksâ€, Sensors, Vol.11, No.4, (2011), pp.4118-4136.

      [15] Dhakar RS, Gupta AK & Sharma P, “Modified RSA encryption algorithm (MREA)â€, Second International Conference on Advanced Computing & Communication Technologies (ACCT), (2012), pp.426-429.

      [16] Raju GVS & Akbani R, “Elliptic curve cryptosystem and its applicationsâ€, IEEE International Conference on Systems, Man and Cybernetics, Vol. 2, (2003), pp.1540-1543.

      [17] Daemen J & Rijmen V, “Rijndael: The Advanced Encryption Standardâ€, D r. Dobb's Journal, (2001).

      [18] Singh SP & Maini R, “Comparison of data encryption algorithmsâ€, International Journal of Computer Science and Communication, Vol.2, No.1,(2011), pp.125-127.

      [19] Sathya D, Kokilavani S & Krithika S, “Providing Security to Medical Dataâ€, Wireless Communication, Vol.8, No.2,(2016), pp.86-89.

      [20] Singh S & Bisht N, “A comparative study of asymmetric and symmetric algorithmsâ€, International journal of Innovative Research in science, engineering and technology, Vol.4, (2015).

      [21] Kaur G & Mahajan M, “Evaluation and Comparison of Symmetric key algorithmsâ€, International Journal of Science, Engineering and Technology Research (IJSETR), Vol.2, No.10,(2013).

      [22] Singh G, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information securityâ€, International Journal of Computer Applications, Vol.67, No.19, (2013).

  • Downloads

  • How to Cite

    Radhika Rani, C., Sai Jagan, L., Lakshmi Harika, C., & V. Durga Ravali Amara, V. (2018). Light weight encryption algorithms for wireless body area networks. International Journal of Engineering & Technology, 7(2.20), 64-66. https://doi.org/10.14419/ijet.v7i2.20.11754