Open AccessPosted Content
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Sadaqat Ur Rehman,Muhammad Bilal,Basharat Ahmad,Khawaja Muhammad Yahya,Anees Ullah,Obaid Ur Rehman +5 more
Reads0
Chats0
TLDR
This research work investigates different cryptographic techniques, and provides efficient techniques for communicating device, by selecting different comparison matrices that satisfies both the security and restricted resources in WSN environment.Abstract:
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.read more
Citations
More filters
Proceedings ArticleDOI
A Comparative Analysis of Hybrid Encryption Technique for Images in the Cloud Environment
TL;DR: This paper addresses the issues of security by proposing a hybrid encryption technique to secure the images using Elliptic Curve Cryptography to generate the secret key, which is used for DES and AES algorithms.
Journal ArticleDOI
TeenySec: a new data link layer security protocol for WSNs
Murat Dener,Omer Faruk Bay +1 more
TL;DR: A Wireless Sensor Network (WSN) link layer security protocol called TeenySec, which combines the advantageous aspects of the Corrected Block Tea Algorithm with the Offset Codebook Mode approaches and is also energy efficient is proposed.
Proceedings ArticleDOI
Secured Wireless Sensor Network Using Improved Key Management
TL;DR: A key management scheme based on symmetric keys has been proposed where each node uses pseudo-random generator (PRNG) to generate key that is shared with base station based on pre-distributed initial key and CBC - RC5 to reached to confidently, integrity and authentication.
Transmission and Authentication of Text Messages through Image Steganography
TL;DR: A scheme, which can encode a text message and transmit it safely to its destination and the receiver can authenticate the received message to ensure that any intruder has not altered the original message.
Journal ArticleDOI
Key pre-distribution approach using block LU decomposition in wireless sensor network
TL;DR: A new and efficient key management scheme for wireless sensor network based on the polynomial pool-based key pre-distribution scheme and the block LU decomposition algorithm and the BLU-decomposition algorithm is proposed.
References
More filters
Proceedings ArticleDOI
Wireless sensor networks for habitat monitoring
TL;DR: An in-depth study of applying wireless sensor networks to real-world habitat monitoring and an instance of the architecture for monitoring seabird nesting environment and behavior is presented.
Proceedings ArticleDOI
TinySec: a link layer security architecture for wireless sensor networks
TL;DR: TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Journal ArticleDOI
Security in wireless sensor networks
TL;DR: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Journal ArticleDOI
Deploying a wireless sensor network on an active volcano
Geoffrey Werner-Allen,Konrad Lorincz,Mario Ruiz,O. Marcillo,Jeffrey B. Johnson,Jonathan Lees,Matt Welsh +6 more
TL;DR: The authors' sensor-network application for volcanic data collection relies on triggered event detection and reliable data retrieval to meet bandwidth and data-quality demands.
Journal ArticleDOI
Security in wireless sensor networks
TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.