Dissertation/Thesis Abstract

Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S., California State University, Long Beach, 2015, 62; 1606061
Abstract (Summary)

The main purpose of implementing a cryptographic algorithm in wireless sensor networks is to protect their data. A Wireless sensor network operates by employing tiny sensors in remote areas. These sensors help in monitoring physical or environmental entities and communicate among themselves. They collect relevant data, process them and send back the required information all the way back to the base station. Algorithms based on private-key cryptography and public-key cryptography play a major role in the protection of data. The most important aspect of data protection is to understand various sensor network applications and apply the most suitable cryptographic algorithm. The most widely used Private-Key Cryptography algorithm is Advanced Encryption Standard (AES) based on block cipher. It is one of the most widely used algorithm. It is faster algorithm compared to Public-Key Algorithm. A Public-Key Algorithm based on mathematical function provide more security compared to Private-Key Algorithms. ElGamal Encryption Algorithm is a type of Public-Key Algorithm that is widely used. We analyze both cryptographic algorithms and compared the capabilities with respect to wireless sensor network and evaluated their strength and weakness.

Indexing (document details)
Advisor: Chang, Chin
Commitee: Ary, James, Sodagari, Shabnam
School: California State University, Long Beach
Department: Electrical Engineering
School Location: United States -- California
Source: MAI 55/03M(E), Masters Abstracts International
Source Type: DISSERTATION
Subjects: Electrical engineering
Keywords: Advanced encryption standard, Cryptography, Elgamal encryption, Energy consumption, Network security, Wireless sensor network
Publication Number: 1606061
ISBN: 9781339362212
Copyright © 2018 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest