Downloads: 2 | Views: 275
Research Paper | Information Security | Saudi Arabia | Volume 10 Issue 11, November 2021 | Popularity: 5.1 / 10
Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities
Mohammed Alwakeel, Sultan Swailem Alatawi
Abstract: A multitude of fields and applications now make use of wireless sensor networks. Yet, despite their versatility and usefulness, these types of networks come with two major drawbacks: Firstly, due to the nature of the fact that they are wireless, this type of networks are very susceptible to attacks and intruders. The second major issue concerns that the limited and irreplaceable resources used in these networks do not generally allow for heavy computation, secure data packing, and sender authentications over an extended period. For these reasons, the selection of a suitable cryptography algorithm that provides an acceptable security level while keeping the use of network resources to a minimum is a task of vital importance. In this paper, the development of a model that allows for the comparison and evaluation of the encryption algorithms used in wireless sensor networks is presented. The model proposed assesses algorithms along two metrics: key strength probability and data acceptance probability. The results from the evaluation of the model using a simulation are encouraging, and we suggest that the model we propose will aid network administrators to select the most appropriate encryption algorithm, namely that which exceeds the desired security level for their network while simultaneously requiring the lowest amount of network resources possible.
Keywords: Wireless sensor network; Cryptography Algorithm; Key Strength Probability, Data Acceptance Probability
Edition: Volume 10 Issue 11, November 2021
Pages: 410 - 415
DOI: https://www.doi.org/10.21275/SR211104233708
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024
Pages: 183 - 184Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)
Velmurugan Dhakshnamoorthy
Downloads: 0
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022
Pages: 1376 - 1377Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models
Santosh Kumar Kande
Downloads: 0
Research Paper, Information Security, United States of America, Volume 13 Issue 3, March 2024
Pages: 1953 - 1955The Role of Asset Inventory Accuracy in Vulnerability Remediation Effectiveness
Santosh Kumar Kande
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi, Dr. Mohammed Naif Alatawi
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 11 Issue 2, February 2022
Pages: 148 - 151Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication
Ujas Dhami, Nisarg Shah