The Safety Framework in Network Security utilizing Cryptographic Systems

Abstract

Remote Sensor Networks comprise of independent sensor hubs appended to one or more base stations.As Wireless sensor systems proceed to grow, they get to be helpless against assaults and subsequently the requirement for powerful security mechanisms.Identification of suitable cryptography for remote sensor systems is a vital test because of the constraint of energy, computation capacity and capacity assets of the sensor nodes.Symmetric based cryptographic plans do not scale well when the quantity of sensor hub increases. Hence open key based plans are broadly used.We present here two open – key based calculations, RSA and Elliptic Curve Cryptography (ECC) and discovered that ECC has a noteworthy point of preference over RSA as it decreases the calculation time furthermore the measure of information transmitted and put away.

Authors and Affiliations

Rakesh Nayak

Keywords

Related Articles

A survey paper of data mining in medical diagnosis

Medical data contain information of patient records from the hospitals .These data when mined properly contain hidden patterns .These can lead to better diagnosis ,medicines treatment .These medical diagnosis can pre...

Embedded Automated Vehicle Location System

A GPS tracking unit is a device that uses the Global Positioning System to determine the location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular interv...

Implementation and Analysis of Power-constrained contrast enhancement algorithm using a sub-band decomposed MSRA for OLED display

This paper presents a power-constrained contrast enhancement algorithm for organic light-emitting diode display based on multi-scale retinex Algorithm (MSRA). In general, MSR, which is the key component of the propose...

Detection Of Connected But A Cut Occurred Somewhere (Ccos) In Wireless Sensor Networks

A wireless sensor network is able to obtain detached into several connected components owing of the crash of some of its intersection, which is entitle such as “cut”. Herein, we deem the problem of detecting cuts as...

Survey of Techniques of High Level Semantic Based Image Retrieval

This paper provides a comprehensive survey of the recent technical achievements in the research area of content based image retrieval. Images are being used since many years in all spheres including Antisocial Element...

Download PDF file
  • EP ID EP28375
  • DOI -
  • Views 271
  • Downloads 5

How To Cite

Rakesh Nayak (2016). The Safety Framework in Network Security utilizing Cryptographic Systems. International Journal of Research in Computer and Communication Technology, 5(1), -. https://europub.co.uk/articles/-A-28375