Communications on Applied Electronics |
Foundation of Computer Science (FCS), NY, USA |
Volume 7 - Number 14 |
Year of Publication: 2018 |
Authors: Tejashwini N., D. R. Shashi Kumar, K. Satyanarayana Reddy |
10.5120/cae2018652755 |
Tejashwini N., D. R. Shashi Kumar, K. Satyanarayana Reddy . Evolution of Cryptographic Algorithm for Resource Constrained Wireless Networks: An Investigation Approach. Communications on Applied Electronics. 7, 14 ( Mar 2018), 1-8. DOI=10.5120/cae2018652755
In the era of the internet of things, provisioning suitable security models for small and resource constrained nodes as well in-network requires consideration of synchronization among heterogeneous operating conditions. This paper provides an investigational study of traditional approaches adopted for resource constrained wireless networks especially Wireless Sensor Network (WSN). The inferring of basic assumptions to propose customized algorithms is discussed to provide an insight into the development of suitable cryptographic and security approaches for future generation WSN that will be a sub-system of Internet-of-Things (IoT). The methodology adopted for investigation includes consideration of recent state of art work published in archival journals including IEEE, Springer, Elsevier, and special edition journals. Initially, approximately 400 plus journals are referred and later articles from various sources since 2015 is considered for an intrinsic explanation of algorithmic consideration, its pros, and cons with a citation to show the potential of its evolution. The outcomes of the paper as statistics, concept, and classification are useful for security specialist researchers and academicians.