Back close

A Survey of Security Protocols in WSN and Overhead Evaluation

Publication Type : Conference Paper

Thematic Areas : Amrita Center for Cybersecurity Systems and Networks

Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2

Source : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Springer International Publishing, Cham, p.729–738 (2015)

Url : http://dx.doi.org/10.1007/978-3-319-12012-6_81

Keywords : AES, RC5, security mechanisms, Skipjack, Symmetric Encryption, Wireless sensor networks

Campus : Amritapuri

School : School of Engineering

Center : Cyber Security

Department : Computer Science, cyber Security

Year : 2015

Abstract : There has been a widespread growth in the area of wireless sensor networks mainly because of the tremendous possibility of using it in a wide spectrum of applications such as home automation, wildlife monitoring, defense applications, medical applications and so on. However, due to the inherent limitations of sensor networks, commonly used security mechanisms are hard to implement in these networks. For this very reason, security becomes a crucial issue and these networks face a wide variety of attacks right from the physical layer to application layer. This paper present a survey that investigates the overhead due to the implementation of some common security mechanisms viz. SPINS, TinySec and MiniSec and also the computational overhead in the implementation of three popular symmetric encryption algorithms namely RC5 AES and Skipjack.

Cite this Research Publication : Shiju Sathyadevan, Prabhakaranl, S., and Bipin, K., “A Survey of Security Protocols in WSN and Overhead Evaluation”, in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Cham, 2015, pp. 729–738.

Admissions Apply Now