Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Obiakor, C.L., Azubogu, A.C.O. & Ayinla, S.L."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Item
    Simple Cryptographic Data Security Algorithm for Wireless Sensor Network
    (Department of Electronic and Computer Engineering, Nnamdi Azikiwe University, Awka., 2017) Obiakor, C.L., Azubogu, A.C.O. & Ayinla, S.L.
    Wireless sensor network (WSN) popularity is increasing for a wide variety of applications, yet the integrity and confidentiality of transmitted data remain one of the major barriers to its full exploitation. In this paper, a light-weight symmetric cryptographic algorithm was developed to encrypt and decrypt data transmitted between the terminal nodes and base station of the experimental WSN testbed developed for pipeline monitoring. This WSN incorporate accelerometers for measuring induced vibration non-invasively and has 5 terminal nodes that communicates to the sink node, which discards corrupt data, aggregates the uncorrupted data and forwards to the base station. A simulator running on a Visual Basic Interface was also developed to test the efficiency and functionality of the developed algorithm. Data was got by simulating leakage at different points of the pipeline with the opening and closing of the valves. The effect of simulated leakage in terms of amplitude of acceleration (vibration change) was found to be proportional to the leak location and sensor nodes location. The results generated from these simulations were implemented with the developed cryptographic simulator, to show how encryption and decryption of data at the different nodes are achieved.

University of Ilorin Library © 2024, All Right Reserved

  • Cookie settings
  • Send Feedback
  • with ❤ from dspace.ng