Enhancing the Security in Signature Verification for WSN with Cryptographic Algorithm

被引:0
|
作者
Jasmin, U. [1 ]
Velayutham, R. [2 ]
机构
[1] Einstein Coll Engn, CCE Dept, Tirunelveli, Tamil Nadu, India
[2] Einstein Coll Engn, CSE Dept, Tirunelveli, Tamil Nadu, India
关键词
AES; S-Box; WSNs; RCON; Signature Verification;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security plays an vital role in wireless sensor networks. Since the nodes are deployed in the physical environment, Hackers may easily access the data. In order to provide security, The Advanced Encryption Standard (AES) algorithm has developed into an option for various security services. Non-Linear arrangements or mechanism of S-Box and RCON of this implementation algorithm is to provide a physically powerful cryptography technology in wireless sensor networks. Initially generate the private and public key for each user and signature verification can be done. This non-linearity provides high degree of security while transmitting data in the wireless sensor networks.
引用
收藏
页码:1584 / 1588
页数:5
相关论文
共 50 条
  • [21] On the security of digital signature algorithm
    Liu, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 362 - 367
  • [22] On the security of the Digital Signature Algorithm
    Blake, IF
    Garefalakis, T
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 87 - 96
  • [23] Information security in WSN applied to smart metering networks based on cryptographic techniques
    Varela, Noel
    Lezama, Omar Bonerge Pineda
    Neira, Harold
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (06) : 8499 - 8506
  • [24] A SECURITY ANALYSIS OF PUBLIC KEY CRYPTOGRAPHIC SYSTEMS USED FOR ELECTRONIC SIGNATURE
    Neacsu, Eugen
    Schiopu, Paul
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2021, 83 (01): : 135 - 146
  • [25] A biometric-based scheme for enhancing security of cryptographic keys
    Siyal, MY
    Ahmed, F
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B407 - B410
  • [26] A security analysis of public key cryptographic systems used for electronic signature
    Neacșu, Eugen
    Șchiopu, Paul
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2021, 83 (01): : 135 - 146
  • [27] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
  • [28] Enhancing Cloud Security Based On Group Signature
    Sakthivel, Arumugam
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (06) : 923 - 929
  • [29] SECURITY ANALYSIS FOR A LIGHTWEIGHT MODIFIED CRYPTOGRAPHIC TEA ALGORITHM
    Elmahallawy, Mohamed
    Aldelhalim, M. B.
    Abdallah, Mohamed
    Elhennawy, Adel
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 75 - 81
  • [30] Semi-automated verification of security proofs of quantum cryptographic protocols
    Kubota, Takahiro
    Kakutani, Yoshihiko
    Kato, Go
    Kawano, Yasuhito
    Sakurada, Hideki
    JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 192 - 220