Students
Teachers
Graduates
Faculties
Wireless sensor networks are pioneers in the field of technology, and it's being focused on employing them in different fields, it will also be the foundation stone of Internet Of Things (IOT). And data collected in some WSN applications may need to be confidential and arrive at its destination properly, and this is a major challenge in WSN due to its limited resources such as energy and computational capabilities, which makes finding appropriate protection mechanisms a difficult task. Symmetric cryptographic algorithms such as RC5, AES, and Skipjack are more suited for secrecy than asymmetric cryptographic algorithms, as they are faster to implement and less complicated in calculations. And CBC-MAC and HMAC technologies are also among the most important message integrity and sending node identity verification technologies.
Tishreen University Journal for Research and Scientific Studies.
2020.
Students
Teachers
Graduates
Faculties