International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 International Conference on Industrial Automation and Computing (ICIAC- 12-13 th April 2014) Jhulelal Institute Of Technology, Lonara, Nagpur 75 | Page Secure Wireless Sensor Network Updates Using OTAP And Performance of Symmetric Encryption Algorithms on Power Consumption Mr. Charan R. Pote 1 , Mr. Punesh U. Tembhare 2 , Mr. Manoj G. Lade 3 1 Assi. Prof., Priyadarshini College of Engg., RTM Nagpur University, India, Email: scrpote@gmail.com 2 Assi. Prof., Priyadarshini College of Engg., RTM Nagpur University, India, Email: punesh_tembhare@yahoo.com 3 Student ME(WCC), Priyadarshini College of Engg, RTM Nagpur University, India, Email: manojglade@gmail.com ABSTRACT Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in remote locations need to be reprogrammed, environmental conditions often make it impossible to physically retrieve them. Over the Air Programming (OAP) plays an important role in achieving this task. Over-the-air programming (OAP) is a fundamental service in sensor networks that relies upon reliable broadcast for efficient dissemination. SenSeOP Programming protocols provide a convenient way to update program images via wireless communication. In hostile environments where there may be malicious attacks against wireless sensor networks, the process of reprogramming faces threats from potentially compromised nodes. While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. The Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. the most common encryption algorithms on power consumption for wireless devices namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, date transmission through wireless network and finally encryption/decryption speed. Keywords- SenSeop, WSN, Security, Encryption Techniques, Power Consumption. I. INTRODUCTION A Wireless Sensor Network (WSN) is composed of small and highly resource-constrained sensor nodes that monitor some measurable phenomenon in the environment, e.g., light, humidity, or temperature. WSNs are deployed in a steadily growing plethora of application areas. These range from military (e.g., security perimeter surveillance) over civilian (e.g., disaster area monitoring) to industrial (e.g., industrial process control). Application scenarios of WSNs typically involve monitoring or surveillance of animals or humans, infrastructure, or territories. Their long-life and large-scale design, various deployment fields, and changing environments necessitate the feasibility of remote maintenance and in-situ reprogramming of sensor nodes using a so-called Over-The- Air Programming (OTAP) protocol. In particular, if sensor nodes are inaccessible after deployment, a reliable OTAP is crucial. We believe that in a plurality of WSNs, the network-wide dissemination of program code is not appropriate. Within a single WSN, the heterogeneity of sensor hardware, the deployment of manifold sensor technologies, the diversity of sensing and communication tasks, and possibly the event and location dependency of software require a flexible, group-wise selective OTAP approach in order to be able to efficiently reprogram a subset of nodes. Furthermore, securing the OTAP protocol is imperative in order to protect the OTAP from unauthorized reprogramming attempts, i.e., to prevent reprogram node attacks . In this paper, present SenSeOP, a Selective and Secure Over The Air Protocol which is integrated in our intrusion detection system and offers both, selective and secure reprogramming in WSNs. For our approach, assume infrequent and non-regular software updates. On the one hand, these updates are supposed to be time- and energy- efficient. Many encryption algorithms are widely available and RESEARCH ARTICLE OPEN ACCESS