International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-7,Issue-12  ( Dec, 2019 )
Past issues
  1. Volume-7,Issue-11  ( Nov, 2019 )
  2. Volume-7, Issue-10  ( Oct, 2019 )
  3. Volume-7, Issue-9  ( Sep, 2019 )
  4. Volume-7, Issue-8  ( Aug, 2019 )
  5. Volume-7, Issue-7  ( Jul, 2019 )
  6. Volume-7, Issue-6  ( Jun, 2019 )
  7. Volume-7, Issue-5  ( May, 2019 )
  8. Volume-7, Issue-4  ( Apr, 2019 )
  9. Volume-7, Issue-3  ( Mar, 2019 )
  10. Volume-7, Issue-2  ( Feb, 2019 )

Statistics report
Feb. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 83
Paper Published : 1216
No. of Authors : 3056
  Journal Paper

Paper Title
Implementation and Analysis of Security System in Wireless Sensor Network Based on Zigbee Standard

Abstract
Wireless Sensor Network (WSN) is a technology that being warmly used both for research and to help human activities. System security is one of the important things that must be considered both in wireless and wire line network. Wireless sensor networks are expanding which are vulnerable and therefore require an effective security mechanism. Wireless sensor networks have several constraints such as limited memory, energy and computational capabilities that create constraints when coupled with security at sensor nodes. To solve the problem, this final project will implement and analyze security system in wireless sensor network refers to ZigBee standard. ZigBee schemes can be synchronized with new protocols targeted at low rates, small power devices, and sensor nodes. ZigBee requires cryptography that is expected to save power, computing power, and storage resources. To that end, the chosen security system is using AES encryption algorithm (Advanced Encryption Standard) which is implemented directly on ZigBee. In this research successfully apply AES128 decryption and encryption algorithm on wireless sensor network. The test used is a passive attack that can only see and capture the package only. In a security performance analysis, the confidentiality parameter is not fulfilled if it does not use security. Integrity parameters are fulfilled using or without security. The largest throughput value is 1122 bytes / s at a distance of 21 meters. And the last delay at a distance of 49.5 meters with a value of 4.1483 s. Key words - WSN, ZigBee, AES128


Author - Jorjiana Aminatus Sip, Rendy Munadi, Gustommy Bisono

| PDF |
Viewed - 48
| Published on 2018-07-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY