2017
DOI: 10.11591/ijece.v7i4.pp2232-2240
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN

Abstract: The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data"s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Indeed, the cryptanalysis targets the encryption keys which are based on cryptographic systems. These systems, that can be either symmetric, asymmetric or hybrid, take care of the management and distribution of the encryption keys [88] [89]. In the following, we detail each of these classes.…”
Section: Basic Security Mechanisms In Wsnsmentioning
confidence: 99%
“…Indeed, the cryptanalysis targets the encryption keys which are based on cryptographic systems. These systems, that can be either symmetric, asymmetric or hybrid, take care of the management and distribution of the encryption keys [88] [89]. In the following, we detail each of these classes.…”
Section: Basic Security Mechanisms In Wsnsmentioning
confidence: 99%
“…A review work towards the comparing the different asymmetric Cryptographic (ECC, RSA, DSA, etc.) algorithms was done for WNS by Singh and Chauhan [23] considering various parameters (weakness, key strength, attacks). The work introduced by Wang et al, [24] gives the security analysis for WSN by considering the wormhole attacks.With the designed security model author has achieved highly effective and accurate security for WSN.…”
Section: Int J Elec and Comp Eng Issn: 2088-8708 mentioning
confidence: 99%
“…The comparison of various crypto analyses procedures are discussed. [6]. Basically, there are three categories of cryptographic algorithms.…”
Section: Encryption Proceduresmentioning
confidence: 99%