TEA ENCRYPTION (ALGORITHM)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
30-01-2010, 07:21 AM


Abstract:
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to provide high security for sensor networks, it is very important to choose a small, efficient and effective encryption algorithm as a security primitive. The TEA (Tiny Encryption Algorithm) is an efficient algorithm that requires little memory and resources. These features make the TEA a good candidate for security mechanism for sensors. In this paper we describe an implementation of the TEA algorithm on the platform of sensor networks. In our experiment, the data packets obtained from photo and temperature sensors are encrypted on the sensor node using the TEA algorithm. After that, they are sent to the base station by radio. The base station will receive the data packets and forward them to attached PC, where the data packets are decrypted and displayed. We also propose a particular approach to efficiently evaluate the performance of the TEA in terms of execution time on sensor nodes.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar ideas
Super Moderator
******

Posts: 10,003
Joined: Apr 2012
#2
03-08-2012, 10:57 AM


to get information about the topic "algorithm encryption" full report ppt and related topic refer the link bellow

topicideashow-to-tea-encryption-algorithm

topicideashow-to-blowfish-encryption-algorithm

topicideashow-to-rsa-%E2%80%93-public-key-cryptography-algorithm

topicideashow-to-symmetric-encryption-algorithms

topicideashow-to-a-survey-of-encryption-algorithms

topicideashow-to-deal-data-encryption-algorithm-with-larger-blocks
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Maximum Power Point Tracking using Perturb and Observe Algorithm For a PV System seminar flower 8 1,948 17-03-2015, 05:40 AM
Last Post: GT Racing
  encryption decryption full report seminar topics 7 9,413 16-01-2014, 11:54 AM
Last Post: seminar project topic
  Image Data Acquisition and compression using K-RLE Algorithm on Embedded ARM ppt seminar projects maker 0 617 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Integer Wavelet Transform based Steganographic Method using OPA Algorithm pdf seminar projects maker 0 386 11-09-2013, 04:04 PM
Last Post: seminar projects maker
  A Time-based Cluster-Head Selection Algorithm for LEACH project girl 2 628 06-09-2013, 09:44 AM
Last Post: study tips
  Optimal Job Scheduling using Ant Colony Algorithm in Grid Computing PPT study tips 0 398 21-08-2013, 02:49 PM
Last Post: study tips
  AN ALGORITHM FOR WATERMARKING MOBILE PHONE COLOUR IMAGES USING BCH CODE pdf study tips 0 387 03-07-2013, 04:53 PM
Last Post: study tips
  Mining Closed Sequences with Constraint Based on BIDE Algorithm Report study tips 0 387 26-06-2013, 04:56 PM
Last Post: study tips
  IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD study tips 0 400 24-06-2013, 04:56 PM
Last Post: study tips
  Comments on ‘‘A note on teaching–learning-based optimization algorithm’’ pdf study tips 0 402 20-06-2013, 04:40 PM
Last Post: study tips