Vivaksha J. Jariwala

  • Citations Per Year
Learn More
The Wireless Sensor Networks (WSNs) consist of the sensor nodes those are severely resource constrained. Hence, the protocols devised for the WSNs employ every possible means of optimizing the associated overhead.The WSNs typically, employ in-network processing that is largely based on the data aggregation operations that aggregate the data into a compact(More)
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an(More)
The Wireless Sensor Networks (WSNs) are composed of resource starved sensor nodes that are deployed to sense, process and communicate vital information to the base station. Due to the stringent constraints on the resources in the sensor nodes on one hand and due to the communications costs being always significantly higher than the data processing costs,(More)
The current US standard for encryption viz. the AES derives its security strength due to its neat algebraic structure based on arithmetic in Galois Fields. It has been accepted by the National Security Agency to secure the information in the SECRET as well as TOP SECRET category. However, with the recent surge in the published attacks on the algebraic(More)
The Wireless Sensor Networks (WSNs) are composed of sensor nodes that are deployed in remote and hostile environments to sense, process and communicate vital information to the base station. Due to the stringent constraints on the resources in the sensor nodes, it is essential to optimally devise the WSN operational paradigms, to minimize the resource(More)
Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the(More)
In-network processing involves processing of the sensed data onthe-fly during the course of the communication to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. One of the approaches to ensure(More)
  • 1