Open Access Open Access  Restricted Access Subscription or Fee Access

Cryptographic Security Issues in Wireless Sensor Networks

S. Mathivilasini, Dr. S.K Srivatsa

Abstract


Compatibility of different cryptographic algorithms plays an important role in wireless sensor network and its applications. The various Methodology for cryptographic ratio of Memory Encryption scheme used effectively in order to save the consumption of power using each and every cryptographic Methods and that are characterized in an orderly manner. Wireless sensor networks (WSNs) consist of base station and a lot of battery-powered and low-cost devices, called sensor nodes. To provide security of the Wireless sensor networks various methods are investigated. In this paper we examine various usage of WSNs by securing the individual nodes


Keywords


WSN, Cryptographic Methods

Full Text:

PDF

References


A Survey of Key Management Schemes in Wireless Sensor Networks Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, FeiHue, Michael Galloway

Bundesamt für Sicherheit in der Information stechnik

“SkipJack and KEA algorithm Specifications”. National Institute of Standards and Technology, Mai.1998

L.R. Knudsen et al :“Truncated and Higher Order Differentials”, FSE ’95

E. Biham et al:“ Differential Cryptanalysis of DES-like Cryp-tosystems”, CRYPTO’90,

A.J. Menezeset al: “Handbook of Applied Cryptography”, ’97


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.