scispace - formally typeset
Open AccessPosted Content

Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

Reads0
Chats0
TLDR
This research work investigates different cryptographic techniques, and provides efficient techniques for communicating device, by selecting different comparison matrices that satisfies both the security and restricted resources in WSN environment.
Abstract
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

A Comparative Analysis of Hybrid Encryption Technique for Images in the Cloud Environment

TL;DR: This paper addresses the issues of security by proposing a hybrid encryption technique to secure the images using Elliptic Curve Cryptography to generate the secret key, which is used for DES and AES algorithms.
Journal ArticleDOI

TeenySec: a new data link layer security protocol for WSNs

TL;DR: A Wireless Sensor Network (WSN) link layer security protocol called TeenySec, which combines the advantageous aspects of the Corrected Block Tea Algorithm with the Offset Codebook Mode approaches and is also energy efficient is proposed.
Proceedings ArticleDOI

Secured Wireless Sensor Network Using Improved Key Management

TL;DR: A key management scheme based on symmetric keys has been proposed where each node uses pseudo-random generator (PRNG) to generate key that is shared with base station based on pre-distributed initial key and CBC - RC5 to reached to confidently, integrity and authentication.

Transmission and Authentication of Text Messages through Image Steganography

TL;DR: A scheme, which can encode a text message and transmit it safely to its destination and the receiver can authenticate the received message to ensure that any intruder has not altered the original message.
Journal ArticleDOI

Key pre-distribution approach using block LU decomposition in wireless sensor network

TL;DR: A new and efficient key management scheme for wireless sensor network based on the polynomial pool-based key pre-distribution scheme and the block LU decomposition algorithm and the BLU-decomposition algorithm is proposed.
References
More filters
Proceedings ArticleDOI

Wireless sensor networks for habitat monitoring

TL;DR: An in-depth study of applying wireless sensor networks to real-world habitat monitoring and an instance of the architecture for monitoring seabird nesting environment and behavior is presented.
Proceedings ArticleDOI

TinySec: a link layer security architecture for wireless sensor networks

TL;DR: TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Journal ArticleDOI

Deploying a wireless sensor network on an active volcano

TL;DR: The authors' sensor-network application for volcanic data collection relies on triggered event detection and reliable data retrieval to meet bandwidth and data-quality demands.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Related Papers (5)