Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks

2012 ◽  
Vol 7 (4) ◽  
pp. 698-709 ◽  
Author(s):  
Kubra Kalkan ◽  
Albert Levi
2021 ◽  
Vol 11 (6) ◽  
pp. 7867-7874
Author(s):  
U. Iftikhar ◽  
K. Asrar ◽  
M. Waqas ◽  
S. A. Ali

Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.


Sign in / Sign up

Export Citation Format

Share Document