Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks

Wireless Sensor is utilized as a part of numerous territories, for example, controlling, checking following. System security is a vital assignment that must be extremely considered when outlining a system. It is characterized as a methodology and process took after by a system head to ensure the system gadgets or the information from undesirable dangers and unapproved clients. System security is the imperative part in data security since it is in charge of securing all information went through system. In current period arrange security has turned out to be more critical for exchange of information starting with one PC then onto the next PC, in each association and the military. With the advancement of web security turn into a noteworthy worry for secure the vital information. Due to quickly expanding no of PC's in associations numerous systems has been built up. As per expanding of no of system and clients on the planet and increment the no of dangers and unapproved client that is the reason the system isn't sheltered and we required a security on the system.

[1]  E. Leavline,et al.  DATA MINING IN NETWORK SECURITY-TECHNIQUES & TOOLS : A RESEARCH PERSPECTIVE , 2013 .

[2]  P. N. Barwal,et al.  Wireless Sensor Networks : Security Issues , Challenges and Solutions , 2006 .

[3]  R. Davis,et al.  The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.

[4]  R. Umarani,et al.  A Survey on Various Most Common Encryption Techniques , 2012 .

[5]  Debasis Das,et al.  The Art of Cryptology: From Ancient Number System to Strange Number System , 2013 .

[6]  Gajendra Singh,et al.  Advance cryptography algorithm for improving data security , 2012 .

[7]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[8]  Priti G. Harne,et al.  Design and Implementation of a System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis , 2015 .

[9]  Ravi Sharma,et al.  Study of Latest Emerging Trends on Cyber Security and its challenges to Society , 2012 .

[10]  Siddharth Ghansela Network Security: Attacks, Tools and Techniques , 2013 .

[11]  C K Marigowda,et al.  SECURITY VULNERABILITY ISSUES IN WIRELESS SENSOR NETWORKS: A SHORT SURVEY , 2013 .

[12]  Banta Singh Jangra,et al.  A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks , 2012 .

[13]  Prerna Mahajan,et al.  A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .

[14]  Abdul Hanan Abdullah,et al.  Security Issues and Attacks in Wireless Sensor Network , 2014 .

[15]  Deepali Virmani,et al.  Routing Attacks in Wireless Sensor Networks: A Survey , 2014, ArXiv.

[16]  Usha Banerjee,et al.  Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection , 2010 .

[17]  Ching Ying Lin,et al.  Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States” , 2013 .