Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Securing Wireless Sensor Networks Using Cryptographic Functions


Affiliations
1 Department of Computer Science and Engineering, Shree Sastha Institute of Engineering and Technology, Chennai, India
     

   Subscribe/Renew Journal


Public key cryptography is widely used for the purpose of confidential key exchange and authentication. Wireless sensor networks (WSN) however are a class of devices with very low computation power and cannot use public key cryptography feasibly. We provide a scheme which updates messages to the nodes as well as secure them using only symmetric cryptography and cryptographic hash functions. The scheme is low on computation; power and bandwidth requirements compared to public key based cryptographic primitives and as such can be used feasibly in any WSN. We implement this scheme in Deluge, a popular network programming protocol. In addition we simulate our scheme in TOSSIM and provide a performance evaluation of our scheme based on power consumption and end to end latency.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 219

PDF Views: 2




  • Securing Wireless Sensor Networks Using Cryptographic Functions

Abstract Views: 219  |  PDF Views: 2

Authors

Arunlal Nadar
Department of Computer Science and Engineering, Shree Sastha Institute of Engineering and Technology, Chennai, India
S. Janani
Department of Computer Science and Engineering, Shree Sastha Institute of Engineering and Technology, Chennai, India

Abstract


Public key cryptography is widely used for the purpose of confidential key exchange and authentication. Wireless sensor networks (WSN) however are a class of devices with very low computation power and cannot use public key cryptography feasibly. We provide a scheme which updates messages to the nodes as well as secure them using only symmetric cryptography and cryptographic hash functions. The scheme is low on computation; power and bandwidth requirements compared to public key based cryptographic primitives and as such can be used feasibly in any WSN. We implement this scheme in Deluge, a popular network programming protocol. In addition we simulate our scheme in TOSSIM and provide a performance evaluation of our scheme based on power consumption and end to end latency.