ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Encrypted MAC for the Authentication Process in WSN

Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.2, No. 12)

Publication Date:

Authors : ;

Page : 30-32

Keywords : IJMTST;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Security infringement and energy consumption issues are vital in WSN (wireless sensor networks). Looking at the attacks like Denial-of-Sleep, Man-in-the-Middle, Correlation attack, etc, are affecting the transfer of any data. It might be the data loss or the modification where in the third party access the information to one self. This paper explains how to authenticate the data transfer using the encryption standards in MAC algorithm in a riskless technique.

Last modified: 2016-12-07 12:30:42