ESRT: event-to-sink reliable transport in wireless sensor networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Power Aware Design of an Elliptic Curve Coprocessor for 8 bit Platforms
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
New directions in cryptography
IEEE Transactions on Information Theory
Review: A survey on cross-layer solutions for wireless sensor networks
Journal of Network and Computer Applications
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Hi-index | 0.00 |
In this paper we have modeled traffic and energy consumption in a secured, power managed wireless sensor network implemented using IEEE 802.15.4 technology. The network is secured through a variant of the secure socket layer protocol, with ephemeral Diffie-Hellman key exchange using elliptic curve cryptography. Our traffic and energy model allows calculations of cluster populations under the simultaneous constraints of prescribed secure event sensing reliability and lifetime of the whole network.