Open AccessPosted Content
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Sadaqat Ur Rehman,Muhammad Bilal,Basharat Ahmad,Khawaja Muhammad Yahya,Anees Ullah,Obaid Ur Rehman +5 more
Reads0
Chats0
TLDR
This research work investigates different cryptographic techniques, and provides efficient techniques for communicating device, by selecting different comparison matrices that satisfies both the security and restricted resources in WSN environment.Abstract:
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.read more
Citations
More filters
Proceedings ArticleDOI
An efficient multimedia compression-encryption scheme using latin squares for securing internet of things networks
Walid El-Shafai,Walid El-Shafai,Ahmed K. Mesrega,Hossam Eldin H. Ahmed,Nermin Abdelwahab,Fathi E. Abd El-Samie,Fathi E. Abd El-Samie +6 more
TL;DR: In this paper, a hybrid scheme of H.264/MVC compression procedure and an encryption process of Latin square cipher (LSC) using symmetric keys is presented, which achieves high protection, integrity, and security performance for different transmitted video frames, high robustness performance against different network attacks.
Journal Article
Survey on Security Improvement using Wireless Sensor Networks
R. Santhosh,M. Shalini +1 more
TL;DR: A survey is taken related to the security purpose of WSN, and a secure encryption transaction algorithm is implemented that helps in encoding the data.
Proceedings ArticleDOI
Feasibility of TEA in wireless sensor networks
TL;DR: Feasibility for wireless sensor network is proposed by introducing a lightweight, fast, efficient Tiny Encryption Algorithm based on security solution against black hole attack in wireless sensor networks (WSNs).
Proceedings ArticleDOI
Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN
B M Devaraju,G T Raju +1 more
TL;DR: A cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks is proposed.
Proceedings ArticleDOI
False Event Detection for Mobile Sinks in Wireless Sensor Networks
Yuichi Sei,Akihiko Ohsuga +1 more
TL;DR: This work proposes a new method that resiliently detects false messages, even when there are a large number of compromised nodes and that can handle situations where the location of the sink changes.
References
More filters
Proceedings ArticleDOI
Wireless sensor networks for habitat monitoring
TL;DR: An in-depth study of applying wireless sensor networks to real-world habitat monitoring and an instance of the architecture for monitoring seabird nesting environment and behavior is presented.
Proceedings ArticleDOI
TinySec: a link layer security architecture for wireless sensor networks
TL;DR: TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Journal ArticleDOI
Security in wireless sensor networks
TL;DR: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Journal ArticleDOI
Deploying a wireless sensor network on an active volcano
Geoffrey Werner-Allen,Konrad Lorincz,Mario Ruiz,O. Marcillo,Jeffrey B. Johnson,Jonathan Lees,Matt Welsh +6 more
TL;DR: The authors' sensor-network application for volcanic data collection relies on triggered event detection and reliable data retrieval to meet bandwidth and data-quality demands.
Journal ArticleDOI
Security in wireless sensor networks
TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.