Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks

被引:0
|
作者
Munivel, E. [1 ]
Ajit, G. M. [1 ]
机构
[1] DOEACC Ctr Calicut, Calicut, Kerala, India
关键词
WSN; PKI; micro PKI; key managemen; Public key encryption;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad-hoc networks particularly Wireless Sensor Network (WSN) have been widely used in many areas for unattended event monitoring. Confidentiality and authenticity are two important security services required for almost every WSN application. However, small memory, weak processor and limited battery power of the sensor nodes are the major obstacles to implement advanced security primitives in them. However the new development of sensors technologies may allow more computational power and gives us the possibility to use public key encryption in WSN if the used algorithm is energy efficient such as ECC. Owing to both, the requirement as well as the obstacles, this paper proposes a lightweight implementation of Public Key Infrastructure (PKI) tailored to implement in resource restrained sensor nodes. We propose a protocol to implement PKI uses public key encryption only for some specific tasks as session key setup between the base station and sensors giving the network an acceptable threshold of confidentiality and authentication.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [11] A Survey on Public Key Mechanism in Wireless Sensor Networks
    He Y.-X.
    Sun F.-J.
    Li Q.-A.
    He J.
    Wang L.-M.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (03): : 381 - 408
  • [12] A public key encryption model for wireless sensor networks
    Rodriguez, H.
    Ontiveros, B.
    Soto, I.
    Carrasco, R.
    [J]. CSNDSP 08: PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING, 2008, : 373 - +
  • [13] A Public Key Technology Platform for Wireless Sensor Networks
    Shih, Wen Chan
    Hu, Wen
    Corke, Peter
    Overs, Leslie
    [J]. SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2008, : 447 - 448
  • [14] Securing Wireless Sensor Networks with Public Key Techniques
    Kumar, Vidham
    Das, Manik Lal
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2008, 5 (3-4) : 189 - 201
  • [15] Hybrid Public Key Authentication for Wireless Sensor Networks
    Kim, Daehee
    Yun, Jakeun
    Kim, Sungjun
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 142 - 143
  • [16] Applicability of Public Key Infrastructures in wireless sensor networks
    Roman, Rodrigo
    Alcaraz, Cristina
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 313 - +
  • [17] Efficient Key Management Scheme in Wireless Sensor Networks
    Zhao, Shen
    Zheng, Jun
    [J]. PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1132 - 1136
  • [18] An Efficient Key Management Protocol for Wireless Sensor Networks
    ZENG Qingguang
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1927 - 1930
  • [19] An Efficient Key Establishment Protocol for Wireless Sensor Networks
    Maleh, Yassin
    Ezzati, Abdellah
    [J]. ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 339 - 352
  • [20] An efficient key predistribution scheme in wireless sensor networks
    Dai, Hangyang
    Xu, Hongbing
    [J]. 2007 FOURTH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 16 - 19