An Encrypted MAC for the Authentication Process in WSN
Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.2, No. 12)Publication Date: 2016-12-03
Abstract
Security infringement and energy consumption issues are vital in WSN (wireless sensor networks). Looking at the attacks like Denial-of-Sleep, Man-in-the-Middle, Correlation attack, etc, are affecting the transfer of any data. It might be the data loss or the modification where in the third party access the information to one self. This paper explains how to authenticate the data transfer using the encryption standards in MAC algorithm in a riskless technique.
Other Latest Articles
- Data Mining on Web URL Using Base 64 Encoding to Generate Secure URN
- A Two Stage Crawler on Web Search using Site Ranker for Adaptive Learning
- Issues of early ethnic history of the Hungarians-Magyars
- Manufacturing technology of building ceramics in Khazar khaganate. Reconstruction experience
- The Tsymlyansk complex of Khazar time on the Lower Don
Last modified: 2016-12-07 12:30:42