원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.6 No.1
2012.01
pp.57-72
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Wireless Sensor Networks have been a great effect in our real life. With its various types of applications WSN is also a matter of concern for its existing vulnerabilities. To prevent those loopholes we need to provide some effective mechanism for providing better security and authentication issues. Wireless Sensor Networks also have a constraint of resources as the nodes work on battery power. In our paper, we have shown such an effective mechanism using a combination of DES and Blowfish in CBC mode for security enhancement which provides high data confidentiality and authentication.
목차
Abstract
1. Introduction
2. Various Attacks on WSN
2.1. Denial of Service attack
2.2. Sinkhole Attack
2.3. Wormhole Attack
2.4. Sybil Attack
2.5. Passive Information Gathering
2.6. Eavesdropping
2.7. Traffic Analysis
3. Security on WSN
4. Applications of WSN
4.1 Battlefield
4.2 Medical Help
4.3 Home Environment
4.4 Environment Monitoring
5. Data Encryption Standard
5.1. Encryption
5.2. Decryption in DES
6. Blowfish Algorithm
6.1. Encryption
6.2. Decryption
7. Cipher Block Chaining
7.1. Advantages of CBC Mode
8. Results
8.1.Based on speed
8.2. Based on Battery Consumption
8.3. Based on Operation Modes
9. Conclusion
References
1. Introduction
2. Various Attacks on WSN
2.1. Denial of Service attack
2.2. Sinkhole Attack
2.3. Wormhole Attack
2.4. Sybil Attack
2.5. Passive Information Gathering
2.6. Eavesdropping
2.7. Traffic Analysis
3. Security on WSN
4. Applications of WSN
4.1 Battlefield
4.2 Medical Help
4.3 Home Environment
4.4 Environment Monitoring
5. Data Encryption Standard
5.1. Encryption
5.2. Decryption in DES
6. Blowfish Algorithm
6.1. Encryption
6.2. Decryption
7. Cipher Block Chaining
7.1. Advantages of CBC Mode
8. Results
8.1.Based on speed
8.2. Based on Battery Consumption
8.3. Based on Operation Modes
9. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
