Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks
Cluster Computing
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
WOWMOM '05 Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
Sensor nodes used to transmit sensitive data, especially in military applications, require securing the data transmitted through the WSNs to maintain the confidentiality of the data and authenticate the participating sensor nodes. Since sensor nodes suffer from limited resources, in memory storage, computing power, energy capabilities and transmission rates, available network security protocols are inadequate. Symmetric algorithms cannot provide the same degree of security as public key algorithms, leading us to devise a new algorithm SHESP that uses public keys within the limitations of sensor nodes. This paper presents a way to utilise existing public key algorithms such as RSA, Diffie-Hellmann and elliptic curve in the field of WSN security by dividing the network into clusters. Our algorithm supplies data confidentiality, node authentication and data integrity while remaining within acceptable memory, time and energy constraints. We provide theoretical and experimental evidence to validate our algorithms. Results reveal significant improvement in data availability, data confidentiality and authenticity while reducing the communication and computation overhead.