700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Special Issue Article Open Access
The Radio Frequency Identification and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The later are efficiently implemented by Hash Message Authentication Codes (HMAC). Current approved implementations of HMAC require resources that cannot be supported in constrained components. The stream ciphering is used in the HMAC mechanism. The same seed based key generation is used in the system. The proposed system is designed to provide authentication, confidentiality and message integrity for wireless sensor node communication. The public key cryptography technique is used to secure the key transfer process. The session-based key is used for message communication. The elliptic curve cryptography technique is used for the key distribution process. The message communication is secured using the RC4 (Rivest Cipher) algorithm. The secure hashing algorithm is used for the message integrity analysis. The Java in Simulation Time (JiST) simulation environment is used for the system development.
ECC, Data integrity, Data confidentiality, SHA., Cellular Communication,Cellular Communication,Cellular Communication