scispace - formally typeset
Open AccessPosted Content

Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

Reads0
Chats0
TLDR
This research work investigates different cryptographic techniques, and provides efficient techniques for communicating device, by selecting different comparison matrices that satisfies both the security and restricted resources in WSN environment.
Abstract
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

An efficient multimedia compression-encryption scheme using latin squares for securing internet of things networks

TL;DR: In this paper, a hybrid scheme of H.264/MVC compression procedure and an encryption process of Latin square cipher (LSC) using symmetric keys is presented, which achieves high protection, integrity, and security performance for different transmitted video frames, high robustness performance against different network attacks.
Journal Article

Survey on Security Improvement using Wireless Sensor Networks

TL;DR: A survey is taken related to the security purpose of WSN, and a secure encryption transaction algorithm is implemented that helps in encoding the data.
Proceedings ArticleDOI

Feasibility of TEA in wireless sensor networks

TL;DR: Feasibility for wireless sensor network is proposed by introducing a lightweight, fast, efficient Tiny Encryption Algorithm based on security solution against black hole attack in wireless sensor networks (WSNs).
Proceedings ArticleDOI

Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN

TL;DR: A cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks is proposed.
Proceedings ArticleDOI

False Event Detection for Mobile Sinks in Wireless Sensor Networks

Yuichi Sei, +1 more
TL;DR: This work proposes a new method that resiliently detects false messages, even when there are a large number of compromised nodes and that can handle situations where the location of the sink changes.
References
More filters
Proceedings ArticleDOI

Wireless sensor networks for habitat monitoring

TL;DR: An in-depth study of applying wireless sensor networks to real-world habitat monitoring and an instance of the architecture for monitoring seabird nesting environment and behavior is presented.
Proceedings ArticleDOI

TinySec: a link layer security architecture for wireless sensor networks

TL;DR: TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Journal ArticleDOI

Deploying a wireless sensor network on an active volcano

TL;DR: The authors' sensor-network application for volcanic data collection relies on triggered event detection and reliable data retrieval to meet bandwidth and data-quality demands.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Related Papers (5)