Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 275

Research Paper | Information Security | Saudi Arabia | Volume 10 Issue 11, November 2021 | Popularity: 5.1 / 10


     

Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities

Mohammed Alwakeel, Sultan Swailem Alatawi


Abstract: A multitude of fields and applications now make use of wireless sensor networks. Yet, despite their versatility and usefulness, these types of networks come with two major drawbacks: Firstly, due to the nature of the fact that they are wireless, this type of networks are very susceptible to attacks and intruders. The second major issue concerns that the limited and irreplaceable resources used in these networks do not generally allow for heavy computation, secure data packing, and sender authentications over an extended period. For these reasons, the selection of a suitable cryptography algorithm that provides an acceptable security level while keeping the use of network resources to a minimum is a task of vital importance. In this paper, the development of a model that allows for the comparison and evaluation of the encryption algorithms used in wireless sensor networks is presented. The model proposed assesses algorithms along two metrics: key strength probability and data acceptance probability. The results from the evaluation of the model using a simulation are encouraging, and we suggest that the model we propose will aid network administrators to select the most appropriate encryption algorithm, namely that which exceeds the desired security level for their network while simultaneously requiring the lowest amount of network resources possible.


Keywords: Wireless sensor network; Cryptography Algorithm; Key Strength Probability, Data Acceptance Probability


Edition: Volume 10 Issue 11, November 2021


Pages: 410 - 415


DOI: https://www.doi.org/10.21275/SR211104233708



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Mohammed Alwakeel, Sultan Swailem Alatawi, "Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities", International Journal of Science and Research (IJSR), Volume 10 Issue 11, November 2021, pp. 410-415, https://www.ijsr.net/getabstract.php?paperid=SR211104233708, DOI: https://www.doi.org/10.21275/SR211104233708

Similar Articles

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024

Pages: 183 - 184

Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)

Velmurugan Dhakshnamoorthy

Share this Article

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022

Pages: 1376 - 1377

Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models

Santosh Kumar Kande

Share this Article

Downloads: 0

Research Paper, Information Security, United States of America, Volume 13 Issue 3, March 2024

Pages: 1953 - 1955

The Role of Asset Inventory Accuracy in Vulnerability Remediation Effectiveness

Santosh Kumar Kande

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami, Nisarg Shah

Share this Article
Top