DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16087
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatia, Ashutosh-
dc.date.accessioned2024-10-15T06:00:51Z-
dc.date.available2024-10-15T06:00:51Z-
dc.date.issued2021-07-
dc.identifier.urihttps://arxiv.org/abs/2107.01810-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16087-
dc.description.abstractCryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its efficiency. Wireless Sensor Networks (WSNs) play a pivotal role in sensing, monitoring, processing, and accumulating raw data to enhance the performance of the actuators, micro-controllers, embedded architectures, IoT devices, and computing machines to which they are connected. With so much threat of potential adversaries, it is essential to scale up the security level of WSN without affecting its primary goal of seamless data collection and communication with relay devices. This paper intends to explore the past and ongoing research activities in this domain. An extensive study of these algorithms referred here, are studied and analyzed. Based on these findings this paper will illustrate the best possible cryptography algorithms which will be most suited to implement the security aspects of the WSN and protect it from any threat and reduce its vulnerabilities. This study will pave the way for future research on this topic since it will provide a comprehensive and holistic view of the subject.en_US
dc.language.isoenen_US
dc.subjectComputer Scienceen_US
dc.subjectCryptographyen_US
dc.subjectAlgorithmsen_US
dc.subjectWireless Communicationen_US
dc.subjectSensor Networksen_US
dc.titleComparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networksen_US
dc.typePlan or blueprinten_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.