Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifications of today’s Berkley/Crossbow MICA2dot motes.
KeywordsSensor Node Wireless Sensor Network Security Management Elliptic Curve Cryptography Encrypt Message
Unable to display preview. Download preview PDF.
- 1.Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution In TinyOS Based on Elliptic Curve Cryptography. In: Proc. IEEE SECON, Santa Clara, California, pp. 71–80 (2004)Google Scholar
- 2.Xbow Sensor Networks, Available at: http://www.xbow.com/
- 4.Rhee, M.Y.: Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley, Chichester (2003)Google Scholar