A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A Cluster Based Secure Cryptography for Sensor Networks
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03
An Enhanced Polynomial-Based Key Establishment Scheme for Wireless Sensor Networks
ETTANDGRS '08 Proceedings of the 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing - Volume 02
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile environments. Basically sensor networks are application dependent. Wireless sensor network (WSN) applications can be classified into two - event based and Continuous monitoring. This paper focuses on continuous monitoring application. One of the major challenges of wireless sensor network is security. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above said challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy consumed by a node, so there is a need to reduce the energy thus the cost incurred by security algorithm.In this paper the performance of the RSA cryptography algorithm is compared with the ELGAMAL cryptography algorithm by evaluating their energy efficiency and network lifetime. A cluster based wireless network topology environment is constructed and their performances were compared in NS2 and the result shows that RSA algorithm consumes less energy than ELGAMAL algorithm.