The main purpose of implementing a cryptographic algorithm in wireless sensor networks is to protect their data. A Wireless sensor network operates by employing tiny sensors in remote areas. These sensors help in monitoring physical or environmental entities and communicate among themselves. They collect relevant data, process them and send back the required information all the way back to the base station. Algorithms based on private-key cryptography and public-key cryptography play a major role in the protection of data. The most important aspect of data protection is to understand various sensor network applications and apply the most suitable cryptographic algorithm. The most widely used Private-Key Cryptography algorithm is Advanced Encryption Standard (AES) based on block cipher. It is one of the most widely used algorithm. It is faster algorithm compared to Public-Key Algorithm. A Public-Key Algorithm based on mathematical function provide more security compared to Private-Key Algorithms. ElGamal Encryption Algorithm is a type of Public-Key Algorithm that is widely used. We analyze both cryptographic algorithms and compared the capabilities with respect to wireless sensor network and evaluated their strength and weakness.
|Commitee:||Ary, James, Sodagari, Shabnam|
|School:||California State University, Long Beach|
|School Location:||United States -- California|
|Source:||MAI 55/03M(E), Masters Abstracts International|
|Keywords:||Advanced encryption standard, Cryptography, Elgamal encryption, Energy consumption, Network security, Wireless sensor network|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be