Illustrate about tinysec protocol, Computer Network Security

Illustrate about TinySec Protocol

TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer cryptography. The link layer protocol security requirements include message integrity, access control, and message confidentiality. The IPSec, SSL/TLS protocols cannot be applied on resource staffed WSN nodes because they are resource intensive. TinySec provides security solutions based on authentication only (TinySec-Auth), and the authenticated encryption (TinySec-AE) security options. TinySec uses "MAC to authenticate data payload which has been encrypted" and "MAC computations done on the packet data".

Posted Date: 7/27/2013 6:17:16 AM | Location : United States







Related Discussions:- Illustrate about tinysec protocol, Assignment Help, Ask Question on Illustrate about tinysec protocol, Get Answer, Expert's Help, Illustrate about tinysec protocol Discussions

Write discussion on Illustrate about tinysec protocol
Your posts are moderated
Related Questions
i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to



Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

why is it that sometime we put password in our account to login or signup and it would not work?