Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Citations
22 citations
17 citations
Cites background from "Comparison Based Analysis of Differ..."
...Compared to the conventional data authentication based on message authentication code (MAC), our security solution of digital watermarking is more suitable for HAN or WSN devices where bulk messages need to continuously exchange, because it has no computational load of encryption/decryption (Rehman et al. 2012)....
[...]
...…conventional data authentication based on message authentication code (MAC), our security solution of digital watermarking is more suitable for HAN or WSN devices where bulk messages need to continuously exchange, because it has no computational load of encryption/decryption (Rehman et al. 2012)....
[...]
17 citations
Cites background from "Comparison Based Analysis of Differ..."
...energy automation, building administration, gaming, health and other commercial and home applications [1]....
[...]
14 citations
References
4,623 citations
Additional excerpts
...Keywords: MAC, WSN, parameter, cryptographic techniques, stream cipher, block cipher, hashing techniques....
[...]
1,751 citations
1,443 citations
1,306 citations
"Comparison Based Analysis of Differ..." refers background in this paper
...nce, supply chain management, fire detection, vision enabling, energy automation, building administration, gaming, health and other commercial and home applications [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15]. With the wide deployment of WSN for multi-faceted applications security is becoming a growing concern. For example, in a battlefield, a military communication net...
[...]
879 citations
Additional excerpts
...Keywords: MAC, WSN, parameter, cryptographic techniques, stream cipher, block cipher, hashing techniques....
[...]