International Journal of Engineering Science and Technology
The sensor nodes are typically resource deficient with energy being the most critical of all the resources. There are usually several security requirements to protect a sensor network. These requirements should be considered during design of a security protocol, including confidentiality, integrity, and authenticity. An effective security protocol should provide services to meet these requirements. In addition to this, sensor devices have critical resource constraints such as memory size and reliability. So a simple but versatile compression technique is necessary for data compression, before the encryption process.