Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm
Message communication in WSNs is not secure because energy-starving networks are
vulnerable to numerous security attacks mainly due to their nature of distribution and …
vulnerable to numerous security attacks mainly due to their nature of distribution and …
A survey on stream ciphers for constrained environments
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …
Performance analysis of message authentication algorithms in wireless sensor networks
V Mohindru, Y Singh - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
Security in an important concern in Wireless Sensor Networks (WSN) because of wide range
of applications like health care monitoring, wildlife monitoring, highway traffic monitoring …
of applications like health care monitoring, wildlife monitoring, highway traffic monitoring …
[PDF][PDF] An efficient hash algorithm to preserve data integrity
GK Sodhi, GS Gaba - Journal of Engineering Science and …, 2018 - jestec.taylors.edu.my
Recent advancements in the field of electronic commerce and internet banking have led to
the growing need for a secure communication system. Various other areas including military …
the growing need for a secure communication system. Various other areas including military …
[PDF][PDF] An efficient secure protocol for wireless sensor networks based on hybrid approach
Abstract Wireless Sensor Networks (WSNs) comprise of independent sensor nodes attached
to one or more base stations. Conversely, the applied placement of sensor systems face …
to one or more base stations. Conversely, the applied placement of sensor systems face …
A novel watermarking scheme for authenticating individual data integrity of WSNs.
G Gao, M Wang - KSII Transactions on Internet & Information …, 2023 - search.ebscohost.com
The limited computing power of sensor nodes in wireless sensor networks (WSNs) and data
tampering during wireless transmission are two important issues. In this paper, we propose …
tampering during wireless transmission are two important issues. In this paper, we propose …
Analysis of encryption mechanism in Office 2013
J Hong, Z Chen, J Hu - 2015 IEEE 9th International Conference …, 2015 - ieeexplore.ieee.org
Microsoft Office is the most popular office software. Office document security is mainly
carried out through encryption by the software encryption function. But as the new decoding …
carried out through encryption by the software encryption function. But as the new decoding …
In-Depth Analysis of the LEACH Routing Protocol for WSNs
A Jasim, R Muhajjar - Journal of Scientific Development for …, 2023 - jsd.sdevelopment4.com
Wireless sensor networks (WSNs) have broad use in various industries, including the
military, healthcare, and automation, because of their ability to assume control without …
military, healthcare, and automation, because of their ability to assume control without …
A Novel Forgery Detection Mechanism for Sensitive Data
V Dhawan, GS Gaba - International Journal of Security and Its …, 2016 - earticle.net
There are some applications of military and e-commerce networks, where security of
transmitted data on unfriendly environment requires more concern as compared to other …
transmitted data on unfriendly environment requires more concern as compared to other …
More Reliable Approach for Detecting Data Alterations in Communication Networks
V Dhawan, GS Gaba - International Journal of Security and Its …, 2016 - earticle.net
Security of precious data is the most critical design parameter of a communication network.
Applications like online banking and military information exchange requires more concern …
Applications like online banking and military information exchange requires more concern …