The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background: In wireless sensor networks nodes are connected to sense and communicate the data to the base station. Method: The ongoing developments of the wireless sensor networks and its applications demands for the efficient and secure communication. Finding: For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. Improvement: This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.

Keywords

Efficient and Reliable Security, Key Management, Symmetrical and Asymmetrical Cryptography, Wireless Sensor Networks (WSNs).
User