Abstract

The wireless sensor network (WSNs) is constructed with a combination of the sensor nodes and the sink nodes. WSNs applied in many applications. The Security in WSNs is necessary because of limitations of storage, computing capacity, power use. Encryption is one of the most important tools utilized to supply the security services for WSNs. Asymmetric and symmetric encryption algorithm can be utilized in the WSNs structure to supply the security. The asymmetric key encryption algorithm gives a higher level of the security, but compared to symmetric key encryption, that causes extra sensor overhead. In this research KCMA method used to generate chains key of twelve experiments of the algorithms (ECC, RSA, ELGamal). These chains merged with hash function SHA2 and XOR. Diehard test was utilized in all experiments to evaluate the randomness of the secret key generated, and show it’s more security system. SHA2 was the best as compared with XOR. Also, the work evaluated the performance (time) for the system and throughput network.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.