Title :
Security approaches based on elliptic curve cryptography in wireless sensor networks
Author :
Mohammed Said Salah;Abderrahim Maizate;Mohammed Ouzzif
Author_Institution :
RITM-ESTC / CED-ENSEM, University Hassan II, Km 7, Eljadida Street, B.P. 8012 Oasis, Casablanca, Morocco
Abstract :
Wireless sensor networks are ubiquitous in monitoring applications, medical control, environmental control and military activities... In fact, a wireless sensor network consists of a set of communicating nodes distributed over an area in order to measure a given magnitude, or receive and transmit data independently to a base station which is connected to the user via the Internet or a satellite, for example. Each node in a sensor network is an electronic device which has calculation capacity, storage, communication and power. However, attacks in wireless sensor networks can have negative impacts on critical network applications leading to the minimization of security within these networks. So it is important to secure these networks in order to maintain their effectiveness. In this paper, we have initially attempted to study approaches oriented towards cryptography and based on elliptic curves, then we have compared the performance of each method relative to others.
Keywords :
"Elliptic curve cryptography","Jamming","Monitoring","Irrigation","Terrorism","Energy consumption"
Conference_Titel :
Microelectronics (ICM), 2015 27th International Conference on
Electronic_ISBN :
2159-1679
DOI :
10.1109/ICM.2015.7437981