International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 257

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017 | Popularity: 6.2 / 10


     

Secure the Sensor Node Data Using AES-EECA and Shamir in Wireless Sensor Networks

Anushka Tyagi, Dr. Vishnu Sharma, S.P.S Chauhan


Abstract: Nowadays a huge demand of resource-limited Wireless Sensor Networks is the need for consistent and effective security devices for them has improved various but its application is a non-trivial task. Restrictions in processing speed, battery power, bandwidth and storage constrain the applicability of present cryptography procedures for WSNs. In this paper, a hybrid process is proposed AES-EECA-Shamir analysed and their suitability for resource-limited wireless network security are associated built on performance principles such as average energy of every node and implementation time. Using simulation tests and logical models, we give a significant investigation and deliberations on practical feasibility of these cryptographic processes in sensor networks to help designers predict security performance under a set of limitations for wireless sensor network.


Keywords: WSN, Sensor nodes, AES, EECA and Shamir, security etc


Edition: Volume 6 Issue 11, November 2017


Pages: 463 - 466



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anushka Tyagi, Dr. Vishnu Sharma, S.P.S Chauhan, "Secure the Sensor Node Data Using AES-EECA and Shamir in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 6 Issue 11, November 2017, pp. 463-466, https://www.ijsr.net/getabstract.php?paperid=ART20173642, DOI: https://www.doi.org/10.21275/ART20173642



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022

Pages: 837 - 842

An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing Using Deep Learning

Bharathi K.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article



Top