Gurjot Singh

Work place: Baba Banda Singh Bahadur Engineering College/ Computer Science & Engineering department, Fatehgarh Sahib, Punjab, India

E-mail: gurjotsingh52@yahoo.com

Website:

Research Interests: Hardware Security, Information Security, Network Security, Information-Theoretic Security

Biography

Er. Gurjot Singh: He received his B.Tech. degree in computer science and engineering from Guru Nanak Dev Engineering College, India and his Master`s degree in computer science and engineering (specialization E-Security) from Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, Punjab, India. His research area includes security in wireless network (Adhoc, Sensor network).

Author Articles
Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes

By Gurjot Singh Sandeep Kaur Dhanda

DOI: https://doi.org/10.5815/ijitcs.2014.08.05, Pub. Date: 8 Jul. 2014

A Wireless Sensor Network is a combination of spatially distributed independent nodes deployed in dense environment, communicating wirelessly over limited bandwidth and frequency. Security and Qos is the major concern in wireless sensor network due to its wireless communication nature and constraints like low computation capability, less memory, bounded energy resources, susceptibility to physical capture or damages and the use of insecure wireless communication channels. These constraints make security along with the QoS, a challenge in wireless sensor network. The cryptographic schemes increases the level of security and make it secure against critical attacks but also has a significant impact on the QoS of wireless sensor network. In this paper, the different cryptographic schemes based on asymmetric key and symmetric key cryptography are evaluated. The symmetric key cryptography schemes require less time for processing, less power and also require less storage space as compared to asymmetric key cryptographic schemes, results in less impact on the QoS of wireless sensor network. In this paper, the QoS of wireless sensor network along with cryptographic schemes will be evaluated on the basis of metrics like throughput, jitter, end-to-end delay, total packet received and energy consumption.

[...] Read more.
Other Articles