A Smart Cryptographic measure for Data Survivability in Unattended Wireless Sensor Networks
Hegde Nischaykumar1, Kulkarni Linganagouda2

1Hegde, Nischaykumar*, Computer Science and Engineering Department, Research Scholar, Visvesvaraya Technological University, Belagavi, India.
2Kulkarni, Linganagouda, Professor, Computer Science and Engineering Department, KLE Technological University, Hubballi, India.
Manuscript received on December 12, 2019. | Revised Manuscript received on December 24, 2019. | Manuscript published on January 10, 2020. | PP: 3527-3530 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8561019320/2020©BEIESP | DOI: 10.35940/ijitee.C8561.019320
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: An Unattended Wireless Sensor Network (UWSN) wherein a sporadically visiting sink tries to collect data absorbed by the motes. This setup is most suitable in hostile environments where the collected valuable data becomes the target for a mobile adversary. Unattended sensors cannot instantly transmit collected data to some safe external entity. Though there is an intermittent visit by the sink, a powerful mobile adversary can easily compromise the valuable data collected by sensor nodes between the intervals. Therefore, the data needs to be preserved to be handed over to the sink in its next visit. This property of unattended WSN is called as Data Survivability. We propose a symmetric key cryptosystem that tackles sensor collected data erasure, modification, or disclosure as a support for data survivability in UWSNs. The proposed model has been designed using Linear Feedback Shift Registers (LFSRs) embodied with less power dissipation mechanism that operates on mask method. This is critical to any application running in unattended environments. We have compared our design with other standard works and have substantially proved the trustworthiness. Our work has been assessed using NIST test suite and found reliable. 
Keywords: Unattended Wireless Sensor Networks (UWSNs), Mobile Adversary, Sink, Symmetric Key Cryptosystem, Data Survivability, Linear Feedback Shift Registers (LFSRs), NIST test suite.
Scope of the Article:  Cryptography and Applied Mathematics