Enhancing the Security in Signature Verification for WSN with Cryptographic Algorithm

被引:0
|
作者
Jasmin, U. [1 ]
Velayutham, R. [2 ]
机构
[1] Einstein Coll Engn, CCE Dept, Tirunelveli, Tamil Nadu, India
[2] Einstein Coll Engn, CSE Dept, Tirunelveli, Tamil Nadu, India
关键词
AES; S-Box; WSNs; RCON; Signature Verification;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security plays an vital role in wireless sensor networks. Since the nodes are deployed in the physical environment, Hackers may easily access the data. In order to provide security, The Advanced Encryption Standard (AES) algorithm has developed into an option for various security services. Non-Linear arrangements or mechanism of S-Box and RCON of this implementation algorithm is to provide a physically powerful cryptography technology in wireless sensor networks. Initially generate the private and public key for each user and signature verification can be done. This non-linearity provides high degree of security while transmitting data in the wireless sensor networks.
引用
收藏
页码:1584 / 1588
页数:5
相关论文
共 50 条
  • [11] Modeling for security verification of a cryptographic protocol with MAC payload
    Wang, HB
    Zhang, YS
    Li, Y
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 538 - 547
  • [12] An Optimal Cryptographic Approach for Addressing Security Breaches to Build Resilient WSN
    Hegde, Nischaykumar
    Kulkarni, Linganagouda
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 21 - 27
  • [13] Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model
    Li, Zimao
    Meng, Bo
    Wang, Dejun
    Chen, Wei
    Journal of Software Engineering, 2015, 9 (01): : 1 - 32
  • [14] Enhancing financial transaction security with lightweight cryptographic algorithms
    Deshpande, Vivek
    Khubalkar, Deepti
    Dhablia, Anishkumar
    Pasha, M. Jahir
    Dhabliya, Dharmesh
    Gandhi, Yatin
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 741 - 751
  • [15] Machine-checked security proofs of cryptographic signature schemes
    Tarento, S
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 140 - 158
  • [16] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [17] ENHANCING THE SECURITY OF ELGAMALS SIGNATURE SCHEME
    HARN, L
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 376 - 376
  • [18] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [19] Application of NTRU Cryptographic Algorithm for SCADA security
    Premnath, Amritha Puliadi
    Jo, Ju-Yeon
    Kim, Yoohwan
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 341 - 346
  • [20] On the Security of the Digital Signature Algorithm
    Ian F. Blake
    Theodoulos Garefalakis
    Designs, Codes and Cryptography, 2002, 26 : 87 - 96