Author:
abd Mohammed,Majeed Huda,Ebis Sif
Abstract
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Subject
Industrial and Manufacturing Engineering,Materials Science (miscellaneous),Business and International Management
Reference37 articles.
1. Biswas, K., Muthukkumarasamy, V., Sithirasenan, E.: Maximal clique based clustering scheme for WSNs. In: 8th IEEE ISSNIP, Melbourne, pp. 237–241 (2013)
2. Biswas, K., Muthukkumarasamy, V., Sithirasenan, E., Usman, M.: An energy efficient clique based clustering and routing mechanism in WSNs. In: 9th IEEE IWCMC, Italy, pp. 171–176 (2013)
3. Shazly, M., Elmallah, E.S., Harms, J., AboElFotoh, H.M.F.: On area coverage reliability of WSNs. In: 36th IEEE LCN Conference, pp. 580–588 (2011)
4. Computerworld Magazine: AES proved vulnerable by Microsoft researchers (2011)
5. Intel Corporation: Intel architecture software developer’s manual (1997)