preview

Secure Protocols For Wsn : A Comparative Study Of Protocols

Best Essays

SECURE PROTOCOLS FOR WSN A COMPARATIVE STUDY OF PROTOCOLS NAME: RITIKA SANJEET RUSTAGI USC ID NUMBER: 4205911885 CSCI 530 COMPUTER SECURITY SYTEMS TILES OF THE PAPER: Abstract Introduction Security requirements of WSNs Choosing efficient encryption algorithm SPINS TinySec Evaluation of SPINS and TinySec Conclusion Acknowledgment References I have read the Guide to Avoiding Plagiarism published by the student affairs office. I understand what is expected of me with respect to properly citing sources, and how to avoid representing the work of others as my own. The material in this paper was written by me, except for such material that is quoted or indented and properly cited to indicate the sources of the material. I understand that using the words of others, and simply tagging the sentence, paragraph, or section with a tag to the copied source does not constitute proper citation and that if such materiel is used verbatim or paraphrased it must be specifically conveyed (such as through the use of quotation marks or indentation) together with the citation. I further understand that overuse of properly cited quotations to avoid conveying the information in my own words, while it will not subject me to disciplinary action, does convey to the instructor that I do not understand the material enough to explain it in my own words, and will likely result in a lesser grade on the paper. Signed by: ______________________________________ SECURE PROTOCOLS FOR WSN A COMPARATIVE STUDY

Get Access