Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks

被引:0
|
作者
Munivel, E. [1 ]
Ajit, G. M. [1 ]
机构
[1] DOEACC Ctr Calicut, Calicut, Kerala, India
关键词
WSN; PKI; micro PKI; key managemen; Public key encryption;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad-hoc networks particularly Wireless Sensor Network (WSN) have been widely used in many areas for unattended event monitoring. Confidentiality and authenticity are two important security services required for almost every WSN application. However, small memory, weak processor and limited battery power of the sensor nodes are the major obstacles to implement advanced security primitives in them. However the new development of sensors technologies may allow more computational power and gives us the possibility to use public key encryption in WSN if the used algorithm is energy efficient such as ECC. Owing to both, the requirement as well as the obstacles, this paper proposes a lightweight implementation of Public Key Infrastructure (PKI) tailored to implement in resource restrained sensor nodes. We propose a protocol to implement PKI uses public key encryption only for some specific tasks as session key setup between the base station and sensors giving the network an acceptable threshold of confidentiality and authentication.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [1] Efficient and Scalable Public Key Infrastructure for Wireless Sensor Networks
    Kim, Daehee
    An, Sunshin
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS, 2014,
  • [2] An implementation of public key infrastructure using wireless communication networks
    Muthayammal Engineering College, Salem, India
    不详
    [J]. Int. J. Grid Distrib. Comput., 3 (35-42):
  • [3] An Implementation of Public Key Infrastructure Using Wireless Communication Networks
    Nandhini, M.
    Praveenkumar, B.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (03): : 35 - 41
  • [4] Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
    Challa, Manoj
    Reddy, M. Damodar
    Reddy, P. Venkata Subba
    Mungara, Jitendra Nath
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 84 - 89
  • [5] Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
    Challa, Manoj
    Reddy, M. Damodar
    Reddy, P. Venkata Subba
    Mungara, Jitendra Nath
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (10): : 10 - 15
  • [6] A level key infrastructure for secure and efficient group communication in wireless sensor networks
    Huang, JH
    Buckingham, J
    Han, R
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 249 - 260
  • [7] Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
    Lederer, Christian
    Mader, Roland
    Koschuch, Manuel
    Grossschaedl, Johann
    Szekely, Alexander
    Tillich, Stefan
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 112 - +
  • [8] Implementing public-key infrastructure for sensor networks
    Malan, David J.
    Welsh, Matt
    Smith, Michael D.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (04)
  • [9] On efficient key redistribution in wireless sensor networks
    Law, Chun-Fai
    Kwok, Yu-Kwong
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOL 1, 2007, : 423 - 430
  • [10] Deployment of public-key infrastructure in wireless data networks
    Singh, AK
    [J]. NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 217 - 224