Open Access Open Access  Restricted Access Subscription Access

Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey


Affiliations
1 Department of Electronics and Communication Systems, Lovely Professional University, Jalandhar-Delhi, G.T. Road, National Highway 1, Phagwara - 144411, Punjab, India
 

Background: In wireless sensor networks nodes are connected to sense and communicate the data to the base station. Method: The ongoing developments of the wireless sensor networks and its applications demands for the efficient and secure communication. Finding: For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. Improvement: This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.

Keywords

Efficient and Reliable Security, Key Management, Symmetrical and Asymmetrical Cryptography, Wireless Sensor Networks (WSNs).
User

Abstract Views: 141

PDF Views: 0




  • Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey

Abstract Views: 141  |  PDF Views: 0

Authors

Heena Dogra
Department of Electronics and Communication Systems, Lovely Professional University, Jalandhar-Delhi, G.T. Road, National Highway 1, Phagwara - 144411, Punjab, India
Jyoti Kohli
Department of Electronics and Communication Systems, Lovely Professional University, Jalandhar-Delhi, G.T. Road, National Highway 1, Phagwara - 144411, Punjab, India

Abstract


Background: In wireless sensor networks nodes are connected to sense and communicate the data to the base station. Method: The ongoing developments of the wireless sensor networks and its applications demands for the efficient and secure communication. Finding: For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. Improvement: This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.

Keywords


Efficient and Reliable Security, Key Management, Symmetrical and Asymmetrical Cryptography, Wireless Sensor Networks (WSNs).



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i47%2F135613