Analysis of Security Algorithms towards secured communication in Wireless Networks

被引:0
|
作者
Kumari, E. Hemalatha Jai [1 ]
Kannammal, A. [2 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
[2] Coimbarore Inst Technol, Dept Com Applicat, Coimbatore, Tamil Nadu, India
关键词
wireless network; clustering; routing; packets; hardware enabled security; WEP;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are now widely used in military surveillance, industrial applications and civilian uses such as pollution control, forest fire detection, farming etc. The design of wireless network varies from application to application. These networks are vulnerable to external threats that may try to gain unauthorized access with malicious intent. The wireless network also has design similarities with adhoc network. In this paper deals with the different security algorithms that exist in wireless network. It also provides analysis for conclusions of the selection of appropriate security algorithm towards improving the trust among users in wireless network. Security issues exist at node level, network level and user level. The security algorithms have been analyzed for wireless networks in different directions and research directions of the analysis has been presented.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Towards improving the security of wireless networks using secured session keys
    Amma, N. G. Nageswari
    Jayaraj, T.
    Amma, N. G. Bhuvaneswari
    [J]. INFORMATION SECURITY JOURNAL, 2024,
  • [2] Security and Wireless Communication Networks
    Qian, Yi
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (03) : 4 - 5
  • [3] Security in Wireless Communication Networks
    Rong, Bo
    [J]. IEEE WIRELESS COMMUNICATIONS, 2023, 30 (01) : 10 - 11
  • [4] Wireless Security - An Approach Towards Secured Wi-Fi Connectivity
    Pimple, Nishant
    Pawar, Utkarsha
    Salunke, Tejashree
    Sangoi, Janhavi
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 872 - 876
  • [5] Parallel cluster formation for secured communication in wireless ad hoc networks
    Shah, V
    Deng, HM
    Agrawal, DP
    [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 475 - 479
  • [6] Towards Virtualisation and Secured Software Defined Networking for Wireless and Cellular Networks
    Ezefibe, Chukwudi A.
    Shayan, Yousef R.
    [J]. 2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,
  • [7] On the Power Consumption of security algorithms employed in wireless networks
    Meintanis, Dimitrios
    Papaefstathiou, Ioannis
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 845 - 849
  • [8] Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication
    Zhang, Run
    Zhou, WenAn
    Hu, Huamiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Secured communication for GSM networks
    Promjiraprawat, K
    Piyatamrong, B
    [J]. ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 1566 - 1570
  • [10] Comparison of Wireless Location Algorithms in Mobile Communication Networks
    Peng, Qian
    Yue, Yinggao
    Chang, Zhengwei
    Zeng, Yi
    Liu, Tao
    Cai, Shaotang
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 1259 - 1264