{"title":"Analysis of security algorithms towards secured communication in wireless networks","authors":"Mrs E Hemalatha, Jai Kumari, Kannammal A","doi":"10.1109/ICCCNT.2012.6511065","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are now widely used in military surveillance, industrial applications and civilian uses such as pollution control, forest fire detection, farming etc. The design of wireless network varies from application to application. These networks are vulnerable to external threats that may try to gain unauthorized access with malicious intent. The wireless network also has design similarities with adhoc network. In this paper deals with the different security algorithms that exist in wireless network. It also provides analysis for conclusions of the selection of appropriate security algorithm towards improving the trust among users in wireless network. Security issues exist at node level, network level and user level. The security algorithms have been analyzed for wireless networks in different directions and research directions of the analysis has been presented.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2012.6511065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Wireless sensor networks are now widely used in military surveillance, industrial applications and civilian uses such as pollution control, forest fire detection, farming etc. The design of wireless network varies from application to application. These networks are vulnerable to external threats that may try to gain unauthorized access with malicious intent. The wireless network also has design similarities with adhoc network. In this paper deals with the different security algorithms that exist in wireless network. It also provides analysis for conclusions of the selection of appropriate security algorithm towards improving the trust among users in wireless network. Security issues exist at node level, network level and user level. The security algorithms have been analyzed for wireless networks in different directions and research directions of the analysis has been presented.