Cryptographic Security Issues in Wireless Sensor Networks
Abstract
Compatibility of different cryptographic algorithms plays an important role in wireless sensor network and its applications. The various Methodology for cryptographic ratio of Memory Encryption scheme used effectively in order to save the consumption of power using each and every cryptographic Methods and that are characterized in an orderly manner. Wireless sensor networks (WSNs) consist of base station and a lot of battery-powered and low-cost devices, called sensor nodes. To provide security of the Wireless sensor networks various methods are investigated. In this paper we examine various usage of WSNs by securing the individual nodes
Keywords
Full Text:
PDFReferences
A Survey of Key Management Schemes in Wireless Sensor Networks Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, FeiHue, Michael Galloway
Bundesamt für Sicherheit in der Information stechnik
“SkipJack and KEA algorithm Specifications”. National Institute of Standards and Technology, Mai.1998
L.R. Knudsen et al :“Truncated and Higher Order Differentials”, FSE ’95
E. Biham et al:“ Differential Cryptanalysis of DES-like Cryp-tosystems”, CRYPTO’90,
A.J. Menezeset al: “Handbook of Applied Cryptography”, ’97
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.