Loading…

Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research...

Full description

Saved in:
Bibliographic Details
Published in:arXiv.org 2012-03
Main Authors: Sadaqat Ur Rehman, Bilal, Muhammad, Ahmad, Basharat, Khawaja, Muhammad Yahya, Ullah, Anees, Obaid Ur Rehman
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Sadaqat Ur Rehman
Bilal, Muhammad
Ahmad, Basharat
Khawaja, Muhammad Yahya
Ullah, Anees
Obaid Ur Rehman
description Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2086220146</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2086220146</sourcerecordid><originalsourceid>FETCH-proquest_journals_20862201463</originalsourceid><addsrcrecordid>eNqNjsFqwkAURQehUGn9hwfd6EIYJ5q6TaeWbnSj4lKG5CV5Ns6k700o_kk_t7H4Aa4uXM7h3oEamiSZTZdzYx7VSOSktTbpq1kskqH6teHcOiYJHt6cYAGZd81FSCCU8E5liYw-guVLG0PFrq0pB-cLWPn82lEv7jCvPX13KLAX8hWsUcRVCFkX696m3P1zNhQI43VmJ0AeDsTY9CBs0Utg2GD8CfwlMD5sN5Nn9VC6RnB0yyf18rHa2c9py-G6FI-n0HH_VY5GL1Nj9GyeJvdRf3JFWIg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2086220146</pqid></control><display><type>article</type><title>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</title><source>Publicly Available Content Database</source><creator>Sadaqat Ur Rehman ; Bilal, Muhammad ; Ahmad, Basharat ; Khawaja, Muhammad Yahya ; Ullah, Anees ; Obaid Ur Rehman</creator><creatorcontrib>Sadaqat Ur Rehman ; Bilal, Muhammad ; Ahmad, Basharat ; Khawaja, Muhammad Yahya ; Ullah, Anees ; Obaid Ur Rehman</creatorcontrib><description>Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Communication ; Costs ; Cryptography ; Encryption ; Energy consumption ; Remote sensors ; Sensors ; Wireless sensor networks</subject><ispartof>arXiv.org, 2012-03</ispartof><rights>2012. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2086220146?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>776,780,25731,36989,44566</link.rule.ids></links><search><creatorcontrib>Sadaqat Ur Rehman</creatorcontrib><creatorcontrib>Bilal, Muhammad</creatorcontrib><creatorcontrib>Ahmad, Basharat</creatorcontrib><creatorcontrib>Khawaja, Muhammad Yahya</creatorcontrib><creatorcontrib>Ullah, Anees</creatorcontrib><creatorcontrib>Obaid Ur Rehman</creatorcontrib><title>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</title><title>arXiv.org</title><description>Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.</description><subject>Algorithms</subject><subject>Communication</subject><subject>Costs</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Energy consumption</subject><subject>Remote sensors</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNjsFqwkAURQehUGn9hwfd6EIYJ5q6TaeWbnSj4lKG5CV5Ns6k700o_kk_t7H4Aa4uXM7h3oEamiSZTZdzYx7VSOSktTbpq1kskqH6teHcOiYJHt6cYAGZd81FSCCU8E5liYw-guVLG0PFrq0pB-cLWPn82lEv7jCvPX13KLAX8hWsUcRVCFkX696m3P1zNhQI43VmJ0AeDsTY9CBs0Utg2GD8CfwlMD5sN5Nn9VC6RnB0yyf18rHa2c9py-G6FI-n0HH_VY5GL1Nj9GyeJvdRf3JFWIg</recordid><startdate>20120314</startdate><enddate>20120314</enddate><creator>Sadaqat Ur Rehman</creator><creator>Bilal, Muhammad</creator><creator>Ahmad, Basharat</creator><creator>Khawaja, Muhammad Yahya</creator><creator>Ullah, Anees</creator><creator>Obaid Ur Rehman</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20120314</creationdate><title>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</title><author>Sadaqat Ur Rehman ; Bilal, Muhammad ; Ahmad, Basharat ; Khawaja, Muhammad Yahya ; Ullah, Anees ; Obaid Ur Rehman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20862201463</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Communication</topic><topic>Costs</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Energy consumption</topic><topic>Remote sensors</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Sadaqat Ur Rehman</creatorcontrib><creatorcontrib>Bilal, Muhammad</creatorcontrib><creatorcontrib>Ahmad, Basharat</creatorcontrib><creatorcontrib>Khawaja, Muhammad Yahya</creatorcontrib><creatorcontrib>Ullah, Anees</creatorcontrib><creatorcontrib>Obaid Ur Rehman</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied &amp; Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sadaqat Ur Rehman</au><au>Bilal, Muhammad</au><au>Ahmad, Basharat</au><au>Khawaja, Muhammad Yahya</au><au>Ullah, Anees</au><au>Obaid Ur Rehman</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</atitle><jtitle>arXiv.org</jtitle><date>2012-03-14</date><risdate>2012</risdate><eissn>2331-8422</eissn><abstract>Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2012-03
issn 2331-8422
language eng
recordid cdi_proquest_journals_2086220146
source Publicly Available Content Database
subjects Algorithms
Communication
Costs
Cryptography
Encryption
Energy consumption
Remote sensors
Sensors
Wireless sensor networks
title Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-22T20%3A34%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Comparison%20Based%20Analysis%20of%20Different%20Cryptographic%20and%20Encryption%20Techniques%20Using%20Message%20Authentication%20Code%20(MAC)%20in%20Wireless%20Sensor%20Networks%20(WSN)&rft.jtitle=arXiv.org&rft.au=Sadaqat%20Ur%20Rehman&rft.date=2012-03-14&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2086220146%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_20862201463%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2086220146&rft_id=info:pmid/&rfr_iscdi=true