In this paper, we tested different security configurations using the two most used transport protocols (HTTP and MQTT). We measured their effects on five ...
Aug 25, 2021 · In the paper named Hands-on evaluation of the cryptographic overhead on wireless sensor networks [9] , we tested different security ...
The experimental results from long runs (60 hours) reveal the cryptographic solution choice is significant for the message delay and additional message length.
... Hands-on evaluation of the cryptographic overhead on wireless sensor networks}, year={2021}, month={August}, volume={}, pages={-} } Create and download bib ...
Analysis of the Cryptographic Algorithms in IoT Communications. C Silva ... Hands-on evaluation of the cryptographic overhead on wireless sensor networks.
In this paper, we evaluate the overhead of comprehensive cryptography algorithms suitable for wireless sensor networks. All the factors that may affect ...
Jun 1, 2023 · Cryptography along with clustering has been found to be a practical and efficient technique to improve the secure and energy-efficient data transmission in ...
People also ask
What are the challenges of wireless sensor network?
What is the main advantage of using wireless sensor networks?
What are hidden terminals and how do they affect the performance of wireless sensor networks?
What are wireless sensor networks How do they work what applications use them?
The main contribution of this work is to carry out an experimental evaluation of a secure key distribution and storage scheme in a WSN using simulation and ...
In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) ...
Sep 3, 2014 · The overhead of protection analysis for WSN cryptographic protocols is almost impossible to perform manually. This increases the difficulty to ...