Loading…
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research...
Saved in:
Published in: | arXiv.org 2012-03 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Sadaqat Ur Rehman Bilal, Muhammad Ahmad, Basharat Khawaja, Muhammad Yahya Ullah, Anees Obaid Ur Rehman |
description | Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2086220146</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2086220146</sourcerecordid><originalsourceid>FETCH-proquest_journals_20862201463</originalsourceid><addsrcrecordid>eNqNjsFqwkAURQehUGn9hwfd6EIYJ5q6TaeWbnSj4lKG5CV5Ns6k700o_kk_t7H4Aa4uXM7h3oEamiSZTZdzYx7VSOSktTbpq1kskqH6teHcOiYJHt6cYAGZd81FSCCU8E5liYw-guVLG0PFrq0pB-cLWPn82lEv7jCvPX13KLAX8hWsUcRVCFkX696m3P1zNhQI43VmJ0AeDsTY9CBs0Utg2GD8CfwlMD5sN5Nn9VC6RnB0yyf18rHa2c9py-G6FI-n0HH_VY5GL1Nj9GyeJvdRf3JFWIg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2086220146</pqid></control><display><type>article</type><title>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</title><source>Publicly Available Content Database</source><creator>Sadaqat Ur Rehman ; Bilal, Muhammad ; Ahmad, Basharat ; Khawaja, Muhammad Yahya ; Ullah, Anees ; Obaid Ur Rehman</creator><creatorcontrib>Sadaqat Ur Rehman ; Bilal, Muhammad ; Ahmad, Basharat ; Khawaja, Muhammad Yahya ; Ullah, Anees ; Obaid Ur Rehman</creatorcontrib><description>Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Communication ; Costs ; Cryptography ; Encryption ; Energy consumption ; Remote sensors ; Sensors ; Wireless sensor networks</subject><ispartof>arXiv.org, 2012-03</ispartof><rights>2012. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2086220146?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>776,780,25731,36989,44566</link.rule.ids></links><search><creatorcontrib>Sadaqat Ur Rehman</creatorcontrib><creatorcontrib>Bilal, Muhammad</creatorcontrib><creatorcontrib>Ahmad, Basharat</creatorcontrib><creatorcontrib>Khawaja, Muhammad Yahya</creatorcontrib><creatorcontrib>Ullah, Anees</creatorcontrib><creatorcontrib>Obaid Ur Rehman</creatorcontrib><title>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</title><title>arXiv.org</title><description>Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.</description><subject>Algorithms</subject><subject>Communication</subject><subject>Costs</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Energy consumption</subject><subject>Remote sensors</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNjsFqwkAURQehUGn9hwfd6EIYJ5q6TaeWbnSj4lKG5CV5Ns6k700o_kk_t7H4Aa4uXM7h3oEamiSZTZdzYx7VSOSktTbpq1kskqH6teHcOiYJHt6cYAGZd81FSCCU8E5liYw-guVLG0PFrq0pB-cLWPn82lEv7jCvPX13KLAX8hWsUcRVCFkX696m3P1zNhQI43VmJ0AeDsTY9CBs0Utg2GD8CfwlMD5sN5Nn9VC6RnB0yyf18rHa2c9py-G6FI-n0HH_VY5GL1Nj9GyeJvdRf3JFWIg</recordid><startdate>20120314</startdate><enddate>20120314</enddate><creator>Sadaqat Ur Rehman</creator><creator>Bilal, Muhammad</creator><creator>Ahmad, Basharat</creator><creator>Khawaja, Muhammad Yahya</creator><creator>Ullah, Anees</creator><creator>Obaid Ur Rehman</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20120314</creationdate><title>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</title><author>Sadaqat Ur Rehman ; Bilal, Muhammad ; Ahmad, Basharat ; Khawaja, Muhammad Yahya ; Ullah, Anees ; Obaid Ur Rehman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20862201463</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Communication</topic><topic>Costs</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Energy consumption</topic><topic>Remote sensors</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Sadaqat Ur Rehman</creatorcontrib><creatorcontrib>Bilal, Muhammad</creatorcontrib><creatorcontrib>Ahmad, Basharat</creatorcontrib><creatorcontrib>Khawaja, Muhammad Yahya</creatorcontrib><creatorcontrib>Ullah, Anees</creatorcontrib><creatorcontrib>Obaid Ur Rehman</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied & Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sadaqat Ur Rehman</au><au>Bilal, Muhammad</au><au>Ahmad, Basharat</au><au>Khawaja, Muhammad Yahya</au><au>Ullah, Anees</au><au>Obaid Ur Rehman</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)</atitle><jtitle>arXiv.org</jtitle><date>2012-03-14</date><risdate>2012</risdate><eissn>2331-8422</eissn><abstract>Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2012-03 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2086220146 |
source | Publicly Available Content Database |
subjects | Algorithms Communication Costs Cryptography Encryption Energy consumption Remote sensors Sensors Wireless sensor networks |
title | Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN) |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-22T20%3A34%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Comparison%20Based%20Analysis%20of%20Different%20Cryptographic%20and%20Encryption%20Techniques%20Using%20Message%20Authentication%20Code%20(MAC)%20in%20Wireless%20Sensor%20Networks%20(WSN)&rft.jtitle=arXiv.org&rft.au=Sadaqat%20Ur%20Rehman&rft.date=2012-03-14&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2086220146%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_20862201463%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2086220146&rft_id=info:pmid/&rfr_iscdi=true |