Enhancing the Security in Signature Verification for WSN with Cryptographic Algorithm

被引:0
|
作者
Jasmin, U. [1 ]
Velayutham, R. [2 ]
机构
[1] Einstein Coll Engn, CCE Dept, Tirunelveli, Tamil Nadu, India
[2] Einstein Coll Engn, CSE Dept, Tirunelveli, Tamil Nadu, India
关键词
AES; S-Box; WSNs; RCON; Signature Verification;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security plays an vital role in wireless sensor networks. Since the nodes are deployed in the physical environment, Hackers may easily access the data. In order to provide security, The Advanced Encryption Standard (AES) algorithm has developed into an option for various security services. Non-Linear arrangements or mechanism of S-Box and RCON of this implementation algorithm is to provide a physically powerful cryptography technology in wireless sensor networks. Initially generate the private and public key for each user and signature verification can be done. This non-linearity provides high degree of security while transmitting data in the wireless sensor networks.
引用
收藏
页码:1584 / 1588
页数:5
相关论文
共 50 条
  • [31] Formal verification method for cryptographic software security based on Hoare logic
    Xiao K.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (04): : 1301 - 1306
  • [32] An Efficient DTW Algorithm for Online Signature Verification
    Patil, Bhushan V.
    Patil, Punam R.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 50 - 54
  • [33] Novel Algorithm for the On-Line Signature Verification
    Zalasinski, Marcin
    Cpalka, Krzysztof
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, PT II, 2012, 7268 : 362 - 367
  • [34] Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach
    Abboud, Samira
    Abdoun, Nabil
    IEEE ACCESS, 2024, 12 : 2589 - 2606
  • [35] An HMM on-line signature verification algorithm
    Muramatsu, D
    Matsumoto, T
    AUDIO-BASED AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 2688 : 233 - 241
  • [36] A robust architecture of ring oscillator PUF: Enhancing cryptographic security with configurability
    Kareem, Husam
    Dunaev, Dmitriy
    MICROELECTRONICS JOURNAL, 2024, 143
  • [37] Smart SSD-Accelerated Cryptographic Shuffling for Enhancing Database Security
    Geng, Tieming
    Huang, Chin-Tser
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVIII, DBSEC 2024, 2024, 14901 : 55 - 70
  • [38] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [39] Fast verification algorithm in elliptic curve digital signature algorithm
    Bai, Guoqiang
    Huang, Zhun
    Chen, Hongyi
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2003, 43 (04): : 564 - 568
  • [40] Cryptographic protocol security analysis based on bounded constructing algorithm
    LI Xianxian & HUAI Jinpeng School of Computer
    Science in China(Series F:Information Sciences), 2006, (01) : 26 - 47