Comparison of Security Protocol Implementation Minisec And Llsp On the Wireless Sensor Network

  • I Gusti Agung Gede Arya Kadyanan Informatika Universitas Udayana
Keywords: Wireless Sensor Network, Security Protocol, Minisec, LLSP, Confidentiality, Integrity, Authentication, Energy Consumption.

Abstract

In this era, there are many types of security protocols in wireless sensor networks. This requires a Security Analysis to choose what type of security protocol to apply to the network. Through this research is expected to help security analysis in the collection of data and information for comparison of performance levels of both protocols and algorithms used. The system built is an implementation in the form of simulation. The simulation runs on NS3 software on Ubuntu 18.04 Linux Operating System.  In this study, a third-party external library crypto++ was embedded to add security features such as encryption and authentication at the simulation stage.  Simulation scenarios built for testing are based on two topologies to determine the performance of Minisec and LLSP security protocols. In the first topology used to measure the performance of Confidentiality, Integrity, and Authentication. The second topology is used to measure the energy consumption of both security protocols with the number of 10, 15, and 20 nodes. From the results of the study, it can be concluded that in the aspect of integrity and authentication obtained that both methods used by each security protocol can drop packages, and provide false message information on packages coming from unauthorized nodes. In the confidentiality aspect, both security protocols are able to hide plaintext and can guarantee the confidentiality of data in network simulations. In terms of total energy spent on the Minisec protocol averaged 1226,977 Joules, while the energy consumption of llsp averaged 1227.4067 Joules. 

 

 

References

] C. C. Cheung, A. D. Krahn, and J. G. Andrade, “The Emerging Role of Wearable Technologies in Detection of Arrhythmia,” Can. J. Cardiol., vol. 34, no. 8, pp. 1083–1087, 2018, doi: 10.1016/j.cjca.2018.05.003.
[2] R. Danuansa, F. A. Yulianto, and S. Prabowo, “Analisis Performansi Dan Simulasi Security Protokol Tinysec Dan Llsp Pada Wireless Sensor Network,” eProceedings Eng., vol. 4, no. 1, pp. 1191–1197, 2017, [Online]. Available: file:///C:/Users/BANU/Zotero/storage/34JLNJ3M/3879.html.
[3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–105, 2002, doi: 10.1109/MCOM.2002.1024422.
[4] A. Perrig, J. Stankovic, and D. Wagner, “S Ecurity in W Ireless S Ensor N Etworks ワイヤレスセンサネットワークにおけるセキュ リティ,” pp. 30–36, 2004.
[5] M. Dener, “Security analysis in wireless sensor networks,” Int. J. Distrib. Sens. Networks, vol. 2014, 2014, doi: 10.1155/2014/303501.
[6] Hartono, “Aplikasi Pengamanan Data Menggunakan Metode Skipjack,” Stmik Ibbi, no. 18, pp. 39–50, 2009.
[7] A. F. Ramdhansya, E. Ariyanto, and H. H. Nuha, “Implementasi Advanced Encryption Standard (Aes) Pada Sistem Kunci Elektronik Kendaraan Berbasis Sistem Operasi Android Dan Mikrokontroler Arduino,” Semin. Nas. Inform., vol. 2014, no. semnasIF, pp. 92–98, 2014.
[8] M. Dener, “Comparison of Encryption Algorithms in Wireless Sensor Networks,” ITM Web Conf., vol. 22, p. 01005, 2018, doi: 10.1051/itmconf/20182201005.
Published
2022-08-24
How to Cite
Kadyanan, I. G. A. G. A. (2022). Comparison of Security Protocol Implementation Minisec And Llsp On the Wireless Sensor Network. Proceeding International Conference on Information Technology, Multimedia, Architecture, Design, and E-Business, 2, 46-53. Retrieved from https://eprosiding.idbbali.ac.id/index.php/imade/article/view/694
Abstract dilihat 433 kali
FULL TEXT diunduh 279 kali