Illustrate about tinysec protocol, Computer Network Security

Illustrate about TinySec Protocol

TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer cryptography. The link layer protocol security requirements include message integrity, access control, and message confidentiality. The IPSec, SSL/TLS protocols cannot be applied on resource staffed WSN nodes because they are resource intensive. TinySec provides security solutions based on authentication only (TinySec-Auth), and the authenticated encryption (TinySec-AE) security options. TinySec uses "MAC to authenticate data payload which has been encrypted" and "MAC computations done on the packet data".

Posted Date: 7/27/2013 6:17:16 AM | Location : United States







Related Discussions:- Illustrate about tinysec protocol, Assignment Help, Ask Question on Illustrate about tinysec protocol, Get Answer, Expert's Help, Illustrate about tinysec protocol Discussions

Write discussion on Illustrate about tinysec protocol
Your posts are moderated
Related Questions
SUCCESS OF IP:  IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware. SCALING:

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

how to link html with a data base

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

what is an SSID?

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo