Enhancing the Security in Signature Verification for WSN with Cryptographic Algorithm

被引:0
|
作者
Jasmin, U. [1 ]
Velayutham, R. [2 ]
机构
[1] Einstein Coll Engn, CCE Dept, Tirunelveli, Tamil Nadu, India
[2] Einstein Coll Engn, CSE Dept, Tirunelveli, Tamil Nadu, India
关键词
AES; S-Box; WSNs; RCON; Signature Verification;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security plays an vital role in wireless sensor networks. Since the nodes are deployed in the physical environment, Hackers may easily access the data. In order to provide security, The Advanced Encryption Standard (AES) algorithm has developed into an option for various security services. Non-Linear arrangements or mechanism of S-Box and RCON of this implementation algorithm is to provide a physically powerful cryptography technology in wireless sensor networks. Initially generate the private and public key for each user and signature verification can be done. This non-linearity provides high degree of security while transmitting data in the wireless sensor networks.
引用
收藏
页码:1584 / 1588
页数:5
相关论文
共 50 条
  • [41] Cryptographic protocol security analysis based on bounded constructing algorithm
    Xianxian Li
    Jinpeng Huai
    Science in China Series F, 2006, 49 : 26 - 47
  • [42] Educating Cryptography using Formal Security Verification tool for Cryptographic Protocols.
    Okazaki H.
    Shimura S.
    Miyamoto T.
    Watanabe T.
    Murakami Y.
    Futa Y.
    Computer Software, 2020, 37 (01) : 99 - 113
  • [43] Security verification of real-time cryptographic protocols using a rewriting approach
    Nara Inst of Science and Technology, Ikoma-shi, Japan
    IEICE Trans Inf Syst, 4 (355-363):
  • [44] Security verification of real-time cryptographic protocols using a rewriting approach
    Tanaka, T
    Kaji, Y
    Watanabe, H
    Takata, T
    Kasami, T
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (04) : 355 - 363
  • [45] Secure Force: A Low-Complexity Cryptographic Algorithm for Wireless Sensor Network (WSN)
    Ebrahim, Mansoor
    Chong, Chai Wai
    2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), 2013, : 557 - 562
  • [46] Enhancing the security of El Gamal's signature scheme
    Tiersma, HJ
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 47 - 48
  • [47] A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
    Henzl, Martin
    Hanacek, Petr
    RADIOENGINEERING, 2016, 25 (01) : 132 - 139
  • [48] Cryptographic Protocol Security Verification of the Electronic Voting System Based on Blinded Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 49 - 57
  • [49] Enhancing the Security of He-Kiesler Signature Schemes
    李春辉
    陈一宏
    Journal of Beijing Institute of Technology(English Edition), 2003, (03) : 326 - 328
  • [50] Cryptographic protocol security analysis based on bounded constructing algorithm
    Li, XX
    Huai, JP
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47