Illustrate about tinysec protocol, Computer Network Security

Illustrate about TinySec Protocol

TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer cryptography. The link layer protocol security requirements include message integrity, access control, and message confidentiality. The IPSec, SSL/TLS protocols cannot be applied on resource staffed WSN nodes because they are resource intensive. TinySec provides security solutions based on authentication only (TinySec-Auth), and the authenticated encryption (TinySec-AE) security options. TinySec uses "MAC to authenticate data payload which has been encrypted" and "MAC computations done on the packet data".

Posted Date: 7/27/2013 6:17:16 AM | Location : United States







Related Discussions:- Illustrate about tinysec protocol, Assignment Help, Ask Question on Illustrate about tinysec protocol, Get Answer, Expert's Help, Illustrate about tinysec protocol Discussions

Write discussion on Illustrate about tinysec protocol
Your posts are moderated
Related Questions
Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

implementing password policy in organisation

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia