首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
  • 本地全文:下载
  • 作者:Sadaqat Ur Rehman ; Muhammad Bilal ; Basharat Ahmad
  • 期刊名称:International Journal of Computer Science Issues
  • 印刷版ISSN:1694-0784
  • 电子版ISSN:1694-0814
  • 出版年度:2012
  • 卷号:9
  • 期号:1
  • 出版社:IJCSI Press
  • 摘要:Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) and need to choose a technique which is feasible for sensor networks. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography, furthermore it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicator, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC
  • 关键词:MAC; WSN; parameter; cryptographic techniques; stream cipher; block cipher; hashing techniques.
国家哲学社会科学文献中心版权所有