Abstract of Secure Anonymity Com, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


Secure Anonymity Communication Protocol for Wireless Sensor Network

Karan Mashal [3] | Kajal Mungase


Abstract: In wireless sensor networks becoming more and more important for sensor nodes to maintain anonymity while communicating data because of security reasons. Anonymous communication among sensor nodes is important, because sensor nodes want to cover up their identities either being a base station or source node Existing anonymity schemes for wireless sensor networks either cannot realize the complete anonymities, or they are suffer from various overheads such as huge memory usage, complex computation. The existing system presenting an efficient secure anonymity communication protocol (SACP) for wireless sensor networks that can realize complete anonymities offering overheads with respect to storage, computation and communication costs.


Keywords: Encryption, Decryption, Security, Wireless sensor network, RSA Algorithm, Hashing, Virtual Node


Edition: Volume 5 Issue 2, February 2016,


Pages: 543 - 545


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Karan Mashal, Kajal Mungase, "Secure Anonymity Communication Protocol for Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 543-545, https://www.ijsr.net/get_abstract.php?paper_id=NOV161075

Similar Articles with Keyword 'Encryption'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top