Open Access
Subscription Access
Analyzing Energy Consumption by Cryptographic Techniques for Secure Communication in Underwater Wireless Sensor Networks
Subscribe/Renew Journal
Underwater Wireless Sensor Networks comprise of a spread of acoustic sensors or nodes deployed in a geographical area of interest under the sea or ocean. The nodes on capturing data from the particular region send it to a central processing point. Due to the characteristics of underwater channel, these types of senor networks are vulnerable to malicious attacks. Being battery powered, energy is an important and critical factor to be considered for underwater sensor networks, along with maintaining the security of data. This paper aims at analyzing the energy consumed by cryptographic algorithms, applied in routing data in a clustered manner, in this category of wireless sensor networks.
Keywords
Acoustic, Asymmetric Key Cryptography, Base Station, Cluster Head, Security, Sensor Node, Symmetric Key Cryptography.
User
Subscription
Login to verify subscription
Font Size
Information
- Das Anjana P., Sabu M. Thampi. “Secure communication in mobile underwater wireless sensor networks” International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, IEEE.
- Akyildiz Ian F., Dario Pompili, Tommaso Melodia. “Underwater acoustic sensor networks: research challenges” Ad hoc networks, vol. 3(3), 2005, pp. 257-279.
- Kim J. E., Yun N. Y., Muminov S., Park S. H., Yi O. Y. “Security in underwater acoustic sensor network: focus on suitable encryption mechanisms” AsiaSim 2012, pp. 160-168.
- Sozer Ethem M., Milica Stojanovic, John G. Proakis. “Underwater acoustic networks” IEEE Journal of Oceanic Engineering, vol. 25(1), 2000, pp. 72-83.
- Mamalis Basilis, et al. “Clustering in wireless sensor networks” RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, Y. Zhang, LT Yang, J. Chen, eds, 2009, pp. 324-353.
- https://community.jisc.ac.uk/library/advisoryservices/introduction-cryptographic-techniques
- G. Guimaraes, E. Souto, D. Sadok and J. Kelner, “Evaluation of security mechanisms in wireless sensor networks” Proceedings Systems Communications, vol. 1(1), 2005, IEEE, pp. 428-433.
- G. Padmavathi, D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks” International Journal of Computer Science and Information Security, vol. 4(1-2), 2009, pp.315-321.
- M. Marine, C. Raphael, W. Phan. “Energy-efficient cryptographic engineering paradigm” Open Problems in Network Security, vol. 1(1), 2012, Springer, pp.78-88.
- R. L. Rivest, A. Shamir, L. Adleman. “A method for obtaining digital signatures and public-key cryptosystems” Communications of the ACM, vol. 21(2), 1978, pp. 120–126.
- Desmond J. Higham, Nicholas J. Higham. “MATLAB guide” Siam, 2005.
- “RSA Laboratories - TWIRL and RSA Key Size” emc.com. Retrieved September 2016.
Abstract Views: 369
PDF Views: 142