Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm

V Mohindru, Y Singh, R Bhatt - International Journal of …, 2020 - inderscienceonline.com
Message communication in WSNs is not secure because energy-starving networks are
vulnerable to numerous security attacks mainly due to their nature of distribution and …

A survey on stream ciphers for constrained environments

SA Jassim, AK Farhan - 2021 1st Babylon International …, 2021 - ieeexplore.ieee.org
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into
stream and block ciphers. A stream cipher is faster and less complex than block ciphers so it …

Performance analysis of message authentication algorithms in wireless sensor networks

V Mohindru, Y Singh - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
Security in an important concern in Wireless Sensor Networks (WSN) because of wide range
of applications like health care monitoring, wildlife monitoring, highway traffic monitoring …

[PDF][PDF] An efficient hash algorithm to preserve data integrity

GK Sodhi, GS Gaba - Journal of Engineering Science and …, 2018 - jestec.taylors.edu.my
Recent advancements in the field of electronic commerce and internet banking have led to
the growing need for a secure communication system. Various other areas including military …

[PDF][PDF] An efficient secure protocol for wireless sensor networks based on hybrid approach

I Ullah, N ul Amin, J Iqbal, M Shahid, F Ali - IJCSNS, 2018 - researchgate.net
Abstract Wireless Sensor Networks (WSNs) comprise of independent sensor nodes attached
to one or more base stations. Conversely, the applied placement of sensor systems face …

A novel watermarking scheme for authenticating individual data integrity of WSNs.

G Gao, M Wang - KSII Transactions on Internet & Information …, 2023 - search.ebscohost.com
The limited computing power of sensor nodes in wireless sensor networks (WSNs) and data
tampering during wireless transmission are two important issues. In this paper, we propose …

Analysis of encryption mechanism in Office 2013

J Hong, Z Chen, J Hu - 2015 IEEE 9th International Conference …, 2015 - ieeexplore.ieee.org
Microsoft Office is the most popular office software. Office document security is mainly
carried out through encryption by the software encryption function. But as the new decoding …

In-Depth Analysis of the LEACH Routing Protocol for WSNs

A Jasim, R Muhajjar - Journal of Scientific Development for …, 2023 - jsd.sdevelopment4.com
Wireless sensor networks (WSNs) have broad use in various industries, including the
military, healthcare, and automation, because of their ability to assume control without …

A Novel Forgery Detection Mechanism for Sensitive Data

V Dhawan, GS Gaba - International Journal of Security and Its …, 2016 - earticle.net
There are some applications of military and e-commerce networks, where security of
transmitted data on unfriendly environment requires more concern as compared to other …

More Reliable Approach for Detecting Data Alterations in Communication Networks

V Dhawan, GS Gaba - International Journal of Security and Its …, 2016 - earticle.net
Security of precious data is the most critical design parameter of a communication network.
Applications like online banking and military information exchange requires more concern …