DocumentCode :
131929
Title :
Exchanging information in wireless sensor networks at very low time consumption rate in an efficient hybrid cryptographic algorithm
Author :
Ali Jatoi, Piyar ; Chowdhry, B.S. ; Memon, Aftab A. ; Ullah, Muhammad Ghazanfar
Author_Institution :
Mehran Univ. of Eng. & Technol., Jamshoro, Pakistan
fYear :
2014
fDate :
11-14 May 2014
Firstpage :
1
Lastpage :
5
Abstract :
Sensors are the tiny nodes which are used for getting information from any particular area for some particular situations. These are usually deployed in such places where existence of human may not be possible. These are very small electronic devices having very short amount of resources like memory, power as well as bandwidth. A number of nodes are deployed which are connected with each other and also connected with a base station. While deploying on particular place, there might occur two types of problems; nodes may be in excess or very far from each other. If the nodes are in majority, then the network may be inefficient due to interference and malicious access control collisions. Efficiency of network is the main issue to be resolved at priority bases. While transferring of information from node to node or from node to base station, the least time must be consumed. As much as the network will be efficient, the data will be received and sent easily from node to node or at sink. For making network reliable and secure, cryptographic techniques have been used. A hybrid algorithm has been suggested here using both symmetric and asymmetric cryptographic techniques. A message is divided into two parts containing Meta data and original data. Symmetric cryptography has been implemented on Meta data part while asymmetric cryptography has been applied for the original part of message. This approach will make our network more efficient as well as secure and reliable.
Keywords :
cryptography; sensor placement; telecommunication network reliability; wireless sensor networks; base station; cryptographic technique; efficient hybrid cryptographic algorithm; information exchange; malicious access control collision; nodes deployement; radiofrequency interference; symmetric cryptography; very low time consumption rate; wireless sensor networks; Algorithm design and analysis; Encryption; Public key cryptography; Routing protocols; Wireless sensor networks; Asymmetric; Elliptic Curve Cryptography; Node; Public Key Cryptography; SPIN; Symmetric; Symmetric Key Cryptography; Wireless Sensor Network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on
Conference_Location :
Aalborg
Print_ISBN :
978-1-4799-4626-6
Type :
conf
DOI :
10.1109/VITAE.2014.6934429
Filename :
6934429
Link To Document :
بازگشت