Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks

07/05/2021
by   Bilwasiva Basu Mallick, et al.
0

Cryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its efficiency. Wireless Sensor Networks (WSNs) play a pivotal role in sensing, monitoring, processing, and accumulating raw data to enhance the performance of the actuators, micro-controllers, embedded architectures, IoT devices, and computing machines to which they are connected. With so much threat of potential adversaries, it is essential to scale up the security level of WSN without affecting its primary goal of seamless data collection and communication with relay devices. This paper intends to explore the past and ongoing research activities in this domain. An extensive study of these algorithms referred here, are studied and analyzed. Based on these findings this paper will illustrate the best possible cryptography algorithms which will be most suited to implement the security aspects of the WSN and protect it from any threat and reduce its vulnerabilities. This study will pave the way for future research on this topic since it will provide a comprehensive and holistic view of the subject.

READ FULL TEXT

page 1

page 13

research
04/03/2023

Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions

The growth in the use of small sensor devices, commonly known as the Int...
research
06/29/2021

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

Side-channel attacks are an unpredictable risk factor in cryptography. T...
research
09/08/2022

Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices

IoT devices are present in many, especially corporate and sensitive, net...
research
02/09/2018

When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users

We evaluate Tencent's QQ Browser, a popular mobile browser in China with...
research
01/03/2022

A Comprehensive Survey on Radio Frequency (RF) Fingerprinting: Traditional Approaches, Deep Learning, and Open Challenges

Fifth generation (5G) networks and beyond envisions massive Internet of ...
research
03/05/2021

A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems

Smart healthcare systems (SHSs) are providing fast and efficient disease...
research
11/14/2020

Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless

While the security literature predominantly focuses on the core network,...

Please sign up or login with your details

Forgot password? Click here to reset