Illustrate about tinysec protocol, Computer Network Security

Illustrate about TinySec Protocol

TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer cryptography. The link layer protocol security requirements include message integrity, access control, and message confidentiality. The IPSec, SSL/TLS protocols cannot be applied on resource staffed WSN nodes because they are resource intensive. TinySec provides security solutions based on authentication only (TinySec-Auth), and the authenticated encryption (TinySec-AE) security options. TinySec uses "MAC to authenticate data payload which has been encrypted" and "MAC computations done on the packet data".

Posted Date: 7/27/2013 6:17:16 AM | Location : United States







Related Discussions:- Illustrate about tinysec protocol, Assignment Help, Ask Question on Illustrate about tinysec protocol, Get Answer, Expert's Help, Illustrate about tinysec protocol Discussions

Write discussion on Illustrate about tinysec protocol
Your posts are moderated
Related Questions
COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

RSA Block and Vernam Stream Ciphers This assignment involves writing two small Python scripts and a report. Before you start you must download the ?le summarysheets.zip from th

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur


1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems