DOI QR코드

DOI QR Code

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks

  • Published : 2008.10.25

Abstract

In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes.

Keywords

Cited by

  1. On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks vol.3, pp.4, 2008, https://doi.org/10.3837/tiis.2009.04.003
  2. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks vol.7, pp.1, 2013, https://doi.org/10.1109/jsyst.2012.2188689
  3. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network vol.21, pp.2, 2016, https://doi.org/10.1007/s11036-016-0683-y
  4. Energy-aware and secure routing with trust for disaster response wireless sensor network vol.10, pp.1, 2017, https://doi.org/10.1007/s12083-015-0421-4
  5. An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network : vol.8, pp.2, 2017, https://doi.org/10.4018/ijismd.2017040102
  6. Fuzzy logic–based jamming detection algorithm for cluster‐based wireless sensor network vol.31, pp.10, 2008, https://doi.org/10.1002/dac.3567
  7. An adaptive neuro-fuzzy logic based jamming detection system in WSN vol.23, pp.8, 2008, https://doi.org/10.1007/s00500-018-3636-5
  8. A PKC-based security architecture for WSN vol.309, pp.None, 2008, https://doi.org/10.1051/matecconf/202030902006