Title :
Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis
Author :
Sahana, Avijit ; Misra, Iti Saha
Author_Institution :
Cognizant Technol. Solution, Kolkata, India
fDate :
Feb. 28 2011-March 3 2011
Abstract :
Application of Wireless sensor network (WSN) is increasing in a rapid speed. As sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that security concern be addressed from the beginning of the system. But sensor networks also introduce severe resource constraints due to their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. There has to be some compromise between the security and the energy. Asymmetric protocol like RSA has not been implemented due to high power constrain and for memory issue. In this paper, we have shown that RSA can be implemented for sensor in an efficient manner by using optimized computation. We have simulated the protocol in NS2.34 platform. The energy requirement gives an optimistic result quite similar to symmetric protocol energy requirement for sensor.
Keywords :
protocols; public key cryptography; telecommunication security; wireless sensor networks; NS2.34 platform; RSA security protocol; WSN; asymmetric protocol; computer security techniques; design analysis; network lifetime analysis; sensor network security; wireless sensor network; Base stations; Encryption; Protocols; Public key; Wireless sensor networks; Asymmetric key; Energy efficient; RSA; Symmetric key; Wireless sensor network;
Conference_Titel :
Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4577-0786-5
DOI :
10.1109/WIRELESSVITAE.2011.5940853