Analysis of Security Algorithms towards secured communication in Wireless Networks

被引:0
|
作者
Kumari, E. Hemalatha Jai [1 ]
Kannammal, A. [2 ]
机构
[1] Bharathiar Univ, Coimbatore, Tamil Nadu, India
[2] Coimbarore Inst Technol, Dept Com Applicat, Coimbatore, Tamil Nadu, India
关键词
wireless network; clustering; routing; packets; hardware enabled security; WEP;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are now widely used in military surveillance, industrial applications and civilian uses such as pollution control, forest fire detection, farming etc. The design of wireless network varies from application to application. These networks are vulnerable to external threats that may try to gain unauthorized access with malicious intent. The wireless network also has design similarities with adhoc network. In this paper deals with the different security algorithms that exist in wireless network. It also provides analysis for conclusions of the selection of appropriate security algorithm towards improving the trust among users in wireless network. Security issues exist at node level, network level and user level. The security algorithms have been analyzed for wireless networks in different directions and research directions of the analysis has been presented.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication
    Al Hayajneh, Abdullah
    Bhuiyan, Md Zakirul Alam
    McAndrew, Ian
    [J]. COMPUTERS, 2020, 9 (01)
  • [22] On communication security in wireless ad-hoc sensor networks
    Slijepcevic, S
    Potkonjak, M
    Tsiatsis, V
    Zimbeck, S
    Srivastava, MB
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 139 - 144
  • [23] Recursive estimation algorithms for power controls of wireless communication networks
    Yin G.G.
    Tan C.-A.
    Wang L.Y.
    Xu C.
    [J]. J. Control Theory Appl, 2008, 3 (225-232): : 225 - 232
  • [24] Algorithms for finding optimal offered load in wireless communication networks
    Wieselthier, JE
    Nguyen, GD
    Ephremides, A
    [J]. MILCOM 97 PROCEEDINGS, VOLS 1-3, 1997, : 1570 - 1574
  • [25] Recursive estimation algorithms for power controls of wireless communication networks
    Gang George YIN
    Chin-An TAN
    [J]. Control Theory and Technology, 2008, (03) : 225 - 232
  • [26] Heavy Secured Routing Protocol: A Secured Routing Protocol for Wireless Networks
    Ganeshkumar, P.
    Gopalakrishnan, S.
    [J]. JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (06) : 1086 - 1095
  • [27] Multi-operator wireless mesh networks secured by an all-encompassing security architecture
    Egners, Andre
    Herrmann, Patrick
    Meyer, Ulrike
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 169 - 186
  • [28] Security in wireless communication
    Rahman, MG
    Imai, H
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 213 - 228
  • [29] Security in Wireless Communication
    Mohammad Ghulam Rahman
    Hideki Imai
    [J]. Wireless Personal Communications, 2002, 22 : 213 - 228
  • [30] Security of Wireless Communication
    Cvrcek, Dan
    [J]. FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 119 - 134