Public Key Techniques for Prevention of Resource Exhaustion Attack in Wireless Sensor Networks

Article Preview

Abstract:

This paper proposes a prevention mechanism for resource exhaustion attack in Wireless Sensor Networks (WSN). WSNs are widely used in science, medical, and military applications. However, WSN has problems of small memory, weak processors, and the limited battery power. On the other hands, public key techniques provide powerful security, but they need high energy, memory, computation cost than the symmetric cryptography. Therefore, we propose a more efficient protocol than the existing protocols in WSN, which analyze RSA algorithm and simulate ECC algorithm in CC2420 which is a true single-chip 2.4Ghz IEEE 802.15.4 compliant RF transceiver designed for low-power and low voltage wireless application. We also compared our proposed protocol and other public key-based protocols.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

159-163

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jun Yang., Deyun Zhang., Yunyi Zhang. "An Energy-Efficient Data Gathering Protocol for Wireless Sensor Networks", Computer and Information Science(ICIS), 2009, pp.780-785.

DOI: 10.1109/iciea.2009.5138502

Google Scholar

[2] Lalit Saraswat., and Sachin Kumar., "Cluster level optimization of residual energy consumption in wireless sensor networks for lifetime enhancement", International Journal on Computer Science and Engineering(IJCSE), 2012, ISSN 0975-3397, Vol.4, p.162.

Google Scholar

[3] Ronald Watro., Derrick Kong., Sue-fen Cuti., Charles Gardiner., Charles Lynn and Peter Kruus., "TinyPK:Securing Sensor Networks with Public Key Technology", Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004, pp.59-64.

DOI: 10.1145/1029102.1029113

Google Scholar

[4] Vorugunti Chandra Sekhar. And Mrudula Sarvabhatla. "Security In Wireless Sensor Networks With Public Key Techniques", Computer Communication and Informatics(ICCCI), 2012, pp.1-16.

DOI: 10.1109/iccci.2012.6158861

Google Scholar

[5] http://docs.tinyos.net/

Google Scholar

[6] http://discovery.csc.ncsu.edu/software/TinyECC/

Google Scholar