Illustrate about tinysec protocol, Computer Network Security

Illustrate about TinySec Protocol

TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer cryptography. The link layer protocol security requirements include message integrity, access control, and message confidentiality. The IPSec, SSL/TLS protocols cannot be applied on resource staffed WSN nodes because they are resource intensive. TinySec provides security solutions based on authentication only (TinySec-Auth), and the authenticated encryption (TinySec-AE) security options. TinySec uses "MAC to authenticate data payload which has been encrypted" and "MAC computations done on the packet data".

Posted Date: 7/27/2013 6:17:16 AM | Location : United States







Related Discussions:- Illustrate about tinysec protocol, Assignment Help, Ask Question on Illustrate about tinysec protocol, Get Answer, Expert's Help, Illustrate about tinysec protocol Discussions

Write discussion on Illustrate about tinysec protocol
Your posts are moderated
Related Questions

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Discuss the risks of having a single root user

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac