Submit Search
Upload
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
•
0 likes
•
27 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i6/IRJET-V4I6502.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
Recommended
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET Journal
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
University of Southern California
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
Network Architecture Review Checklist
Network Architecture Review Checklist
Eberly Wilson
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
IJCSES Journal
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
eSAT Publishing House
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
CSCJournals
IRJET- Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
IRJET Journal
Lecture 11
Lecture 11
vishal choudhary
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
Lecture 5
Lecture 5
vishal choudhary
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Indexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industry
drboon
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
rahulmonikasharma
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
Lecture 17
Lecture 17
vishal choudhary
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
IRJET Journal
More Related Content
What's hot
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET Journal
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
University of Southern California
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
Network Architecture Review Checklist
Network Architecture Review Checklist
Eberly Wilson
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
IJCSES Journal
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
eSAT Publishing House
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
CSCJournals
IRJET- Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
IRJET Journal
Lecture 11
Lecture 11
vishal choudhary
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
Lecture 5
Lecture 5
vishal choudhary
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Indexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industry
drboon
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
rahulmonikasharma
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
ijtsrd
Lecture 17
Lecture 17
vishal choudhary
What's hot
(20)
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
Network Architecture Review Checklist
Network Architecture Review Checklist
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
A review on software defined network security risks and challenges
A review on software defined network security risks and challenges
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
IRJET- Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
Lecture 11
Lecture 11
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
Lecture 5
Lecture 5
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
Indexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industry
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
Lecture 17
Lecture 17
Similar to Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
IRJET Journal
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
IRJET Journal
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
IRJET Journal
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET Journal
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET Journal
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
IRJET Journal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET Journal
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
Similar to Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
(20)
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Recently uploaded
(20)
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2589 Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study Heena Dogra1, Jyoti Kohil2 1Student, M-Tech, Electronics and Communication Engineering, Jalandhar, Punjab, India 2Assistant Professor, Department of Electronics and Electrical Engineering, Jalandhar, Punjab, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In wireless sensor networks use of nodes which serves as the communicating devices in the networks. The use of such nodes comes with the security issues like data confidently, data availability, authentication, data integrity. All these issues should be solved by using cryptography techniques to provide efficient and reliable security for secure data transmission. This paper speaks to a review over the utilization of cryptography procedures in WSNs. The primary concentration of this paper is utilization of public key cryptography procedures over thesymmetricaloneandgiving a solid and secure information transmission. Key Words: Wireless Sensor Networks (WSNs), Efficient and Reliable Security, Security Issues, Cryptography. 1. INTRODUCTION The first section of this paper provides the introductory concepts of WSN, security issues and requirements. The section II reviews the various cryptographic techniques. In section III the reviews for the typesofcryptography withkey management ideas. Section IV contains the current and future work in asymmetrical cryptography and section V provides the general views of our work on the concluded comparison between cryptography techniques and at last this paper is finished up with section VI. 1.1 WIRELESS SENSOR NETWORKS. A remote sensor system has a storage facility of capacity, handling, detecting and transmission as principle electronic parts in a conveyed way. It contains countless, self- coordinated and, low controlled gadgets called sensor hubs which are utilized to detect the nearness of wanted application like temperature control, fire cautions, development location, and so forth. In WSNs an extensive number of haphazardly disseminated, battery-worked, inserted gadgets that are utilized to gather, prepare, and pass on information to the clients as a matter of course as its fundamentals of operation [1]. Every hub is intended for performing errands like gathering information, detecting, preparing and speaking with different hubs [2]. For some ongoing applications the sensor hubs are performing distinctive diverse undertakings like distinguishing the neighbor hubs, savvy detecting, putting away of information and handling of put away information, information total, following of target, control and observing, hub restriction, synchronization and proficient steering amongst hubs and base station [3]. As appeared in figure 1 the WSN contains a detecting unit, a handling unit and an imparting unit every one of these units are controlled by a powerunitusedtogive the working of WSNs by utilizing these critical units to give dependable and productive working of conveying between the hubs and for secure information transmission imparting between the hubs ought to be solid and effective. Fig- 1: Block Diagram of Wireless Sensor Network WSNs couldn't give a solid and an effective working model because of the dangers of systems administration. These dangers are influencing distinctive layers of imparting conventions essentially, transport layer, organize layer, session and application layers. Before actualizing information uprightness, information secrecy, and information validation we should managethesedangersand ought to discover some approaches to maintain a strategic distance from them. 1.2 THREATS IN WSNs. The following threats in wireless sensor network includes basically security issues of the secure data transmission in WSNs during node communication includes some of the basic communication threats and some advance threats which affects the wireless sensor network’s working model [4]. The following table shows the basic threats involvement in WSNs.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2590 Table -1: Threats in WSNs. Threaets Description False node insertion Flow false data and prevents the true data to flow. Routing attack Changes the routingpathcausing Sinkhole, Warm hole. Malicious data False observations. Subversion of node Node misbehavior causes extraction of data. 1.3 SECURITY REQUIREMENTS. When managing security in WSNs, mostly the issue is accomplishing thesecurityamidtransmissionofinformation over the communication system which includes a few or all security issues portrayed beneath. There are different security issues in WSN as takes after [5]. 1. Data Integrity: It is the ability to confirm the messagehas not been changed while it was on the network i.e. messaging authentication. 2. Data Freshness: Ensures that the informationislater,and no old messages have been sending again i.e. stays away from replay of messages. 3. Data Availability: Determines whether a node has the ability to use the resources and whether the network is available for the messages to communicate i.e. node availability is there or not. 4. Data Confidentiality: It is the abilitytohidemessagefrom a passive attacker i.e. data encryptionordata authentication. 5. Self-Organization:Aremotesensorarrangerequireseach sensor hub to be autonomous and sufficiently adaptable to act naturally sorting out and self-recuperating as indicated by various circumstances i.e. long life time ought to be there for a hub in a system. 6. Authentication: Ensures that the communication from one node to another node is authorized i.e. authenticated users are communicating in a network to avoid attacker’s forgery. 2. CRYPTOGRAPHY TECHNIQUES. Cryptography plans are created to meet the fundamental security prerequisites of secrecy and honesty in systems to give dependable and productive secure information transmission i.e. security of information and client's character over an uncertain system. Cryptography is basically encryption techniques used for encryption of data or information into some secured data packetsofcodeddata words i.e. raw data is converted into a secure coded data packets, which is beingtransmittedoverthe network instead of direct original data packets transmission in an insecure format. Encrypted data is basically a set of some extra bits along with the data bits for securing the original data from being accessed by the unauthorized users’ means the original data is encrypted into some data bits in a coded form by changing its actual sequence into some random occurrence. During transmission encrypted data which is secured and compatible to the existing protocols over the network operating as a layered model of network i.e. compatible for transmission over the physical, data link, transport, and network and application layers in a secure way without being affected by threats of protocols layered architecture as original sequence of data is randomized using encryption techniques. Cryptography is basically of two types: Symmetric Cryptography (secret key) and Asymmetrical Cryptography (public key) [6]. 1. Symmetrical cryptography / Symmetric encryption / secret-key cryptography: Most referred earlier technique and uses only a singlesecret key for both encryption and decryptionofthedata packetsin a communicating network which is kept as secret in a network as shown in Figure 2. This technique makes use of only a single key called secret key which is shared between the communicating parties over the network, thus this process of sharing the key is much threat prone. The further classification of Symmetric key algorithms isi)block ciphers for fixed transformations i.e. when data transmission is considered to be of fixed size as every time the sequence of data bits and their size is same with may be same or different content, and ii) stream ciphers for time varying transformations, where size is variedaccordingtothelength and type of data being transmitted over the network. The two subdivisions are used for comparing encryption algorithms on plain texts of the algorithm at various levels for example, the levels would be considered as various data types, battery power consumption parameters, variousdata block sizes, for various key sizes [14] [15] and various encryption/decryption speeds [7] [8] used as comparison basics. Fig- 2: Symmetric -Key Cryptography.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2591 Keeping the key secreted in the network in the most difficult task in the network as this key more prone to threats over the insecure channel [9]. Examples of Symmetric key cryptosystems are AES, DES, RC4 CAST,RC5algorithmsused in WSN [12] [13] [14] [15] these are the algorithms employed to implement the symmetrical encryption techniques but not used mostly now as it is as the threat levels are high, they are used in combinations to provide secure data transmission. 2. Asymmetric Cryptography/Asymmetric encryption /public-key cryptography: Being used at present time as cryptography technique in recent years due to its advantages over symmetrical techniques which were used toencryptanddecryptthedata. Asymmetrical cryptography strategyutilizestwokeyspublic and private keys for information encryption and decryption which stays away from the danger of key partaking in a system to execute solid security needs as the general public key just shared over the uncertain system yet the unscrambling should be possible just by utilizing theprivate key which is accessible just to the decoding hubatgoal [9]as appeared in figure 3. Fig- 3: Asymmetric Key Cryptography. The keys are used as two-way security providers as the algorithm uses a pair of keys which are not same and not made for same encryption and decryption purpose, private key never makes the encrypted data publically known to every user it is only provided to the authorized users for accessing the data and by having matched private key a user can decrypt the data at the destination end comparing its public and private key with the sender’s public and private key i.e. key sharing of public key could not benefits the attacker to decrypt the data as for decrypting the data private key is required and which is not shared over the network only authorized user is having private key for data decryption. 3. ASYMMETRICAL CRYPTOGRAPHY IMPLEMENTATIONS. A public key cryptography/Asymmetrical Cryptography is basically used now as this cryptography technique avoids threats of security more efficiently then symmetrical ones. As the basic principle of public key says it consists of a pair of related and different keys i) public: provided publicallyto all the users in a communicating network ii) private: user specified i.e. between only two secured and authorized users. The keys are related to each other but computationally different as theyaretwodifferentkeys,also we cannot determine our private key using our public key because of having different computation processing [10] as shown in figure 4 thus higher level attacks are avoided by using such cryptography algorithms and also degrades security complexities by avoiding known key in a network i.e. public key only used for encryption of data but not for decryption of data therefore, mostly applicable for data communication in present era [11]. 3.1 PUBLIC KEY CRYPTOGRAPHY. Asymmetric cryptography such as the Diffie-Hellman key exchange system [14] [15], ECC or RSA signatures are typically used in WSNs [12]. Mostly RSA are easy to employee thus used widely in WSNs. RSA is having easy computational capabilities but employed less as the new developments like ECC provides less hardware implementations as compared to RSA but for the software developments mostly RSA is preferred due to its easy computational processing’s. Fig- 4: Public key cryptography. 3.2 KEY MANAGEMENT. Key administration is the most up to date scope for actualizing open key cryptography in WSNs which is generally utilized now as open key encryption system. Key administration is a fundamental security issue in remote sensor systems to set up the safe correspondence utilizing cryptographic advances between sensor hubs in a detected region over a shaky system. Key administration is the procedure by which cryptographic keys are produced, put away, secured, exchanged, stacked, utilized, anddemolished in a system. There are four central issues in a key administration system: 1. Key arrangement/pre-circulation: How to characterize the path by which the key appropriation oughtto befinished prior to the hubs are sent and what number of keys are required for arrangement in entire system? 2. Key foundation: How a gathering of hubs could build up any protected session in the imparting system over an uncertain channel or system for secure information
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2592 transmission in WSNs and being not influenced by the dangers in the system layers? 3. Part/hub option: How ought to a hub could be added to the system to such an extent that it ought to have the capacity to set up secure sessions with existing hubs in the system, while not having the capacity to make issues for pervious information stream in the system? 4. Part/hub expulsion: How ought to a hub could be expelled from the system to such an extent that it won't again have the capacity to build up secure sessions with any of the current hubs in the system, and not have the capacity to interpret next information stream in the system? 4. CURRENT AND FUTURE WORK. In WSNs Symmetrical cryptography are more prone to security issues while the stronger asymmetrical cryptography still seems to be applicable one in providing security for secure data transmission needs. The Public key cryptosystems are used presently for solving securityissues of WSNs currently mostly ECC, RSA, LPKC (large size PKC), MQ-PKC (multivariate quadratic PKC)[12][13][14][15]are used along with key generation techniques either using static key generation or by using group key generation providing number of WSNs applications successful implementations [14] [15]. Thekeygenerationisthebasicof new work being deployed in WSNs while are implementing public key cryptography in today’s scenario as with key generation the problems regarding key exchange and key sharing are being solved easily. 4.1 WORK BEING DONE. The study of key management schemes are based on the review of some research papers defining some works done on cryptography for solving security issues on data transmission over the network. 1. Wenliang Du. Jing Deng. Yunghsidng S. Hant. Shigang ChenT. also, Prainod K. Varshney (2004): "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge"- this paper concentrates on the ideas based to accomplish securityinremotesensorsystems for which it is essential to encode messages sent among sensor hubs. Keys for encryption purposes must be settled upon by conveying hubs. 2. Examination of cryptography for remote sensor arrange security by F. Amin, A. H. Jahangir, and H. Rasifard (2008): According to their review RSA isnota productivemethod for information encryption in WSNs. For this they have ComparedECC-160andRSA-1024.Resultsdemonstrates that execution of RSA cryptography devours more endeavors for actualizingsecurityprerequisiteswhencontrastedwithECC- 224 which gives more plausible, time and power utilization arrangements. 3. Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, Ahlem Bencheikh (2010): "An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks"- portrays the assets constraint of WSNs makes the general population key based arrangements, which offer more proficient key administration administrations, inadmissible for remote sensor systems. In this paper, a novel effective tree-based probabilistic key administration conspire which is exceedingly flexible against hub catch assaults. Arrangement depends on symmetric cryptography with a probabilistic key pre-dispersion. 4. Unforgiving Kupwade Patil, Joseph Camp, Stephen A. Szygenda (2012): In thispaper,proposedanarea andvitality productive directing plan utilizing character bases cryptography. Explored the established particular sending assault on WSN and perceive how a personality based cryptographic plan utilizing a cross-layer configuration approach is useful in evading such an assault. Also, demonstrated that a personality basedcryptographicway to deal with steering in WSN is more down to businessthen the conventional open key framework (PKI) based plans. 5. Kun Mu, Qingmin Cui (2012): This paper depends on "An Efficient Pairwise Key Establishment Scheme for Wireless Sensor Networks" portraying about the Wireless Sensor Networks (WSNs) and Security in WSNs whichisbasicwhen there are potential foes. In this paper, novel key administration conspire for remote sensor systems are assessed. The plan depends on EG plan and utilize one-way hash capacity to produce another key pool from a given key pool. Contrasted with leaving key pre conveyanceconspires, this plans is generously more strength against sensor hubs catch. 6. Information security utilizing open key cryptography in WSNs by Amin Reza Sedghi, Mohammad Reza Kaghazgaran (June 2013): The utilization of open key cryptography on little remote gadgets is given unraveling to solid and effective verification and key trade conventions prerequisites. 7. PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks by Daehee Kim, Sunshin An (April 15, 2016): PKC-based cryptography resistance plans regard dodge DoS assaults and are vitality proficient and dependably holds information bundlesunderacknowledged limit constrains regardless of the possibility that vast number of false parcels are being produced by neighboring cells. 8. Open Key Cryptographic Primitives in Wireless Sensor Networks by Kyung-Ah Shim (2016): For information correspondence and transmission PKC primitives are
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2593 productive arrangement suppliers in settling on choicesand outlining security conspires on WSN systems which are straightforwardly material for WSNs applications without much adjustment. 9. Key eras from remote channels by Junqing zhang, Trungq. Duong, Alan marshall, and Roger woods (2016): For simple and proficient reasonable working of key era with cryptography calculations in WSNs arbitrary key era for remote correspondence channels are utilized. 5. COMAPARISION RESULTS. The following resultsareobtained byapplyingtheconcluded work. 0 50 100 150 -1 -0.5 0 0.5 1 Dead Nodes In Network Rounds DeadNodes 0 50 100 150 99 99.5 100 100.5 101 Alive Nodes In Network Rounds Alive Fig- 4: Node formation and comparision of dead and alive nodes. 0 20 40 60 80 100 120 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5 1.6 x 10 -5 Rounds Delay Fig- 5: Dealy graph. 0 10 20 30 0.985 0.99 0.995 1 1.005 energydissipatedbyNodes time 0 20 40 60 0.97 0.98 0.99 1 1.01 energydissipatedbynodes time 0 20 40 60 80 0.94 0.96 0.98 1 energydissipatedbyNodes time 0 50 100 0.94 0.96 0.98 1 energydissipatedbyNodes time Fig- 6: Energy dissipation graphs based on asymmetrical techniques. 6. CONCLUSIONS In this way finished up data proposes that the Public key cryptography is more useful as a result of its low memory utilization, low CPU utilization, and little key size over symmetrical plans. These plans givepositivevitalitybenefits than doing irregular drops as in key administration plans. The time calculationsaremoredependablewithvariable key administration era procedures giving proficient security objectives as the key size is indistinguishable and differedat each progression without being in need to make them known to all hubs in a system as key calculation for key calculation for computing open key and private key is not same and not indistinguishable keys are utilized for encryption and decryption. Thesymmetrical cryptographyis not appropriate for WSNs when contrasted with asymmetrical cryptography as symmetrical cryptosystems because of maintain a strategic distance from security dangers effectively. Notwithstandingkeyadministrationand security, public key cryptography can be the effective and dependable plan for number of WSNs applications as key administration scopes the general public key cryptosystems more solid and productive type of key era and trade handle. Likewise the public cryptosystems are more proficient in security objectives accomplishment when contrasted with symmetrical ones as symmetrical ones needs to give the connection keys publically which causes unapproved assaults and client's information security absconds while public cryptosystems does not have to publically profittheir key era as public key is utilized for encryption is promptly accessible yet the private key utilizedforunscramblingisnot made accessible in this manner security dangers decreases as assailant have no learning in regards to the private key which can decode the information hence information respectability, information secrecy, and validation could be accomplished which gives the fundamental secure transmission needs achievement. REFERENCES [1] K. Akkaya and M. Younis, "A Survey on steering conventions for remote sensor systems, Ad Hoc arranges", 3 (2005), pp 325-349. [2] Gustavo S. Quirino, Admilson R. L. Riberio and Edward David Moreno "Hilter kilterEncryptioninremotesensor systems", 8(2012), http;// dx.doi.org/10.5772/48464. [3] E. Shi and A. Perrig, "Outlining secure sensor systems". Remote correspondence magazine, 11 (6), pp 37-43, 2004. [4] Y. Wang, G. Attebeery, and B. Ramamurthy, "A Survey of security issues in remote sensor systems", IEEE correspondence overviews and instructional exercises, 8(2): pp 2-23, 2006. [5] Y. Wang, W. Hmm, S. Chellappan, Dong Xuan, and Ten H. Laii, "Seek based physical assaults in sensor systems: Modeling and Defense, specialized report, bureau of
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2594 software engineering and designing, Ohio state college, 2005. [6] Shish Ahmad, MohamadRizwanask,andQamarAbbas," Energy sparing secure structure for sensor arrange utilizing circular bend cryptography Mobile Adhoc systems", pp 167-172, 2012. [7] R. Ahlswede and I. Csiszar,"Common irregularityindata hypothesis and cryptography I. mystery sharing" , vol. 39, no.4, pp 1121-1132, July.1993. [8] D. Han Kerson, A. Meneres, S. Vanstone, "Manual for Elliptical bend cryptography", Springer-Verlag New York, Inc. 2004. [9] A. J. Menezes, P.C. Van oorschot, S.A. Vanstone, "Handbook of connected cryptography", 1997. [10] G. Gaubtaz, J. P. Kaps, and B. Sunar, "Open key cryptography in sensor systems returned to", pp 1-17, 2004. [11] A. S. Meander, N. Gura, H. Eberle, V. Gupta and S.C. Shantz, "Vitality examination of open key cryptography for remote sensor arrange", pp 324-328, 2005. [12] Zhang Yu, "The Scheme of open key foundation for enhancing remotesensorsystemssecurity",pp167-172, 2003 [13] W. Du, J. Deny, Y. S. Han, Shigang Chen, P. K.Varshney,"A key administration conspire for remote sensororganize utilizing arrangement learning", 2004. [14] O. Gungor, F. Chen, C. E. Koksal, "Emit key era through restriction and portability", vol. 6, no. 6, pp 2214-2230, Jun. 2015. [15] H. Liu, J. Yang, Y. Wang, Y. Chen and C. E. Koksal, "Gather key era", vol. 13, no. 12, pp 2820-2835, Dec 2014. BIOGRAPHY HEENA DOGRA Student, M-Tech, Electronics and Communication Engineering, Jalandhar, Punjab, India
Download now