A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Comparison of Encryption Algorithms in Wireless Sensor Networks
2018
ITM Web of Conferences
In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize
doi:10.1051/itmconf/20182201005
fatcat:qmv7tocaebaa5mcff4ad5risni