An asymmetric key-based security architecture for wireless sensor networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless senso...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Korea Society of Internet Information
2008
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/795/1/An_Asymmetric_Key-Based_Security_Architecture_for_Wireless_Sensor_Networks.pdf http://irep.iium.edu.my/795/ http://www.itiis.org/ksii/acoms/index.jsp?lang=eng&publisher_cd=ksii1&jn_cd=E1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.795 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.7952011-12-27T02:18:38Z http://irep.iium.edu.my/795/ An asymmetric key-based security architecture for wireless sensor networks Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon Huh, Eui-Nam Q Science (General) QA76 Computer software In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes. Korea Society of Internet Information 2008 Article REM application/pdf en http://irep.iium.edu.my/795/1/An_Asymmetric_Key-Based_Security_Architecture_for_Wireless_Sensor_Networks.pdf Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon and Huh, Eui-Nam (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Transactions on Internet and Information Systems, 2 (5). pp. 265-279. ISSN 1976-7277 http://www.itiis.org/ksii/acoms/index.jsp?lang=eng&publisher_cd=ksii1&jn_cd=E1 DOI: 10.3837/tiis.2008.05.004 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
Q Science (General) QA76 Computer software |
spellingShingle |
Q Science (General) QA76 Computer software Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon Huh, Eui-Nam An asymmetric key-based security architecture for wireless sensor networks |
description |
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes. |
format |
Article |
author |
Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon Huh, Eui-Nam |
author_facet |
Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon Huh, Eui-Nam |
author_sort |
Haque, Md. Mokammel |
title |
An asymmetric key-based security architecture for wireless sensor networks |
title_short |
An asymmetric key-based security architecture for wireless sensor networks |
title_full |
An asymmetric key-based security architecture for wireless sensor networks |
title_fullStr |
An asymmetric key-based security architecture for wireless sensor networks |
title_full_unstemmed |
An asymmetric key-based security architecture for wireless sensor networks |
title_sort |
asymmetric key-based security architecture for wireless sensor networks |
publisher |
Korea Society of Internet Information |
publishDate |
2008 |
url |
http://irep.iium.edu.my/795/1/An_Asymmetric_Key-Based_Security_Architecture_for_Wireless_Sensor_Networks.pdf http://irep.iium.edu.my/795/ http://www.itiis.org/ksii/acoms/index.jsp?lang=eng&publisher_cd=ksii1&jn_cd=E1 |
_version_ |
1643604671870271488 |
score |
13.211869 |