Comparison of Encryption Algorithms in Wireless Sensor Networks

In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, exces...

Full description

Bibliographic Details
Main Author: Dener Murat
Format: Article
Language:English
Published: EDP Sciences 2018-01-01
Series:ITM Web of Conferences
Online Access:https://doi.org/10.1051/itmconf/20182201005
_version_ 1818657841208098816
author Dener Murat
author_facet Dener Murat
author_sort Dener Murat
collection DOAJ
description In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize time and vital objectives. While ensuring security, it is also necessary to consider other important criteria such as memory usage, energy and latency of Sensor Networks. In this study, encryption is described in Wireless Sensor Networks and Skipjack, XXTEA and AES encryption algorithms are compared using TOSSIM simulation program in TinyOS operating system considering memory usage, energy and delay criteria. The study is considered to be useful academicians who study security in Wireless Sensor Networks.
first_indexed 2024-12-17T03:47:53Z
format Article
id doaj.art-bda4b3e65a374f7193694a8d1094782e
institution Directory Open Access Journal
issn 2271-2097
language English
last_indexed 2024-12-17T03:47:53Z
publishDate 2018-01-01
publisher EDP Sciences
record_format Article
series ITM Web of Conferences
spelling doaj.art-bda4b3e65a374f7193694a8d1094782e2022-12-21T22:04:51ZengEDP SciencesITM Web of Conferences2271-20972018-01-01220100510.1051/itmconf/20182201005itmconf_cmes2018_01005Comparison of Encryption Algorithms in Wireless Sensor NetworksDener MuratIn general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize time and vital objectives. While ensuring security, it is also necessary to consider other important criteria such as memory usage, energy and latency of Sensor Networks. In this study, encryption is described in Wireless Sensor Networks and Skipjack, XXTEA and AES encryption algorithms are compared using TOSSIM simulation program in TinyOS operating system considering memory usage, energy and delay criteria. The study is considered to be useful academicians who study security in Wireless Sensor Networks.https://doi.org/10.1051/itmconf/20182201005
spellingShingle Dener Murat
Comparison of Encryption Algorithms in Wireless Sensor Networks
ITM Web of Conferences
title Comparison of Encryption Algorithms in Wireless Sensor Networks
title_full Comparison of Encryption Algorithms in Wireless Sensor Networks
title_fullStr Comparison of Encryption Algorithms in Wireless Sensor Networks
title_full_unstemmed Comparison of Encryption Algorithms in Wireless Sensor Networks
title_short Comparison of Encryption Algorithms in Wireless Sensor Networks
title_sort comparison of encryption algorithms in wireless sensor networks
url https://doi.org/10.1051/itmconf/20182201005
work_keys_str_mv AT denermurat comparisonofencryptionalgorithmsinwirelesssensornetworks