Corpus ID: 10392148

Security in Wireless Sensor Networks using Cryptographic Techniques

@inproceedings{Panda2014SecurityIW,
  title={Security in Wireless Sensor Networks using Cryptographic Techniques},
  author={M. Panda},
  year={2014}
}
Wireless sensor networks consist of autonomous sensor nodes attached to one or more base stations.As Wireless sensor networks continues to grow,they become vulnerable to attacks and hence the need for effective security mechanisms.Identification of suitable cryptography for wireless sensor networks is an important challenge due to limitation of energy,computation capability and storage resources of the sensor nodes.Symmetric based cryptographic schemes donot scale well when the number of sensor… Expand
Framework for Providing Security and Energy saving Using Elliptic Curve Cryptography in Wireless Sensor Networks
In this recent years wireless sensors attracted the wireless sensor networks due to the significant advances in minimization. Wireless sensor networks consist of autonomous sensor nodes attached toExpand
A Comparative Analysis of Cryptographic Keys and Security
TLDR
The analysis is concentrated on the key generation techniques, encryption/decryption solutions, and the importance to emerging technology for providing security in wireless sensor networks. Expand
Encryption Model for Sensor Data in Wireless Sensor Networks
TLDR
The evolution of the model for encrypting sensor data after it is collected by the sink from the sensor is discussed, from a very simplified scheme with a single key to a more sophisticated scheme which performs dual encryption over the data. Expand
Security Enhancement of Wireless Sensor Networks : A Hybrid Efficient Encryption Algorithm Approach
Wireless sensor networks are new technologies that are used for various purposes such as environmental monitoring, home security, industrial process monitoring, healthcare programs and etc. WirelessExpand
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN
TLDR
Different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table. Expand
WSN Security: An Asymmetric Encryption and Hash Function based Approach
Wireless Sensor Network (WSN) security is important for various futuristic applications like military, nuclear power plant, health care etc., In these applications the security is considered alongExpand
Security and Timing Analysis of Hybrid Algorithm for ZigBee in Wireless Sensor Network
In Wireless Sensor Network sensor nodes are used for monitoring and controlling action. These sensors interact with sensitive data and may operate in averse condition, hence security of this networkExpand
Improved Confidentiality for Data Transfer in Wireless Sensor Networks
TLDR
This paper develops an algorithm that manipulates the bits to obtain a new value for the key and proves that the use of this algorithm does not reduce the performance of the security model. Expand
Enhanced encryption model for sensor data in wireless sensor network
  • Anusha Vangala, P. Parwekar
  • Computer Science
  • 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)
  • 2017
TLDR
This paper analyses the weaknesses of the previous scenarios and proposes improvements on them by making use of mathematical operations to manipulate the keys used for the encryption of each sensor with comparable time taken for security operations in the sink. Expand
New Security Protocol using Hybrid Cryptography Algorithm for WSN
TLDR
This paper aims to propose a hybrid security protocol for WSN, which will help in improving the security systems for the WSN. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 35 REFERENCES
Energy Saving Secure framework for Sensor Network using Elliptic Curve Cryptography
TLDR
This paper proposes an energy efficient secure framework that proves the authentication, Integrity, and also provides secure communication among sensor nodes by using public key algorithms. Expand
The scheme of public key infrastructure for improving wireless sensor networks security
  • Zhang Yu
  • Computer Science
  • 2012 IEEE International Conference on Computer Science and Automation Engineering
  • 2012
TLDR
A Public Key Infrastructure for wireless sensor networks tries to solve the problem of security in WSN by the use of public key cryptography as a tool for ensuring the authenticity of the base station. Expand
Revisiting Public-Key Cryptography for Wireless Sensor Networks
TLDR
It becomes highly desirable to have a secure and efficient distribution mechanism that allows simple key generation for large-scale sensor networks while facilitating all the necessary authentications. Expand
A survey of security issues in wireless sensor networks
TLDR
This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection. Expand
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
  • An Liu, P. Ning
  • Computer Science
  • 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)
  • 2008
TLDR
TinyECC is presented, a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications and shows the impacts of individual optimizations on the execution time and resource consumptions. Expand
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
TLDR
A summary of the security provided by the chosen stream ciphers, especially the ones dedicated to software uses recently proposed in the European Project Ecrypt, workpackage eStream, is presented and some implementation tests performed on the platform are presented. Expand
An efficient scheme for authenticating public keys in sensor networks
TLDR
This paper investigates how to replace one of the important PKC operations--the public key authentication--with symmetric key operations that are much more efficient, especially compared to symmetric-key algorithms. Expand
Survey and benchmark of block ciphers for wireless sensor networks
TLDR
This work constructs an evaluation framework, and selects the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). Expand
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
TLDR
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints. Expand
...
1
2
3
4
...