Wireless Sensor Networks - Technology and Protocols 2012
DOI: 10.5772/48464
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Encryption in Wireless Sensor Networks

Abstract: Additional information is available at the end of the chapter http://dx.doi.org/10.5772/48464 IntroductionA Wireless Sensor Network (WSN) is composed of autonomous devices called sensor nodes that generally have low computational power, limited data transmission and power constraints. A WSN consists of sensor nodes that capturing information from an environment, processing data and transmitting them via radio signals. WSNs are increasingly present in our days and can be found in environmental area (climatic me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…Therefore, we prefer the use of asymmetric PLE (APLE or public key) to reduce the complexity of key distribution and key management. There are already many mature asymmetric encryption algorithms in the upper layers [23], [24], but there is very little work in the physical layer. Of relevance is the work [12] in which a method was proposed using a massive MIMO channel as the key between the sender and the desired receiver, but this method requires the transmitter to know the channel state information for precoding which may be impractical for some scenarios.…”
Section: ) Security Does Not Rely On Channel Information and Eavesdropper Statusmentioning
confidence: 99%
“…Therefore, we prefer the use of asymmetric PLE (APLE or public key) to reduce the complexity of key distribution and key management. There are already many mature asymmetric encryption algorithms in the upper layers [23], [24], but there is very little work in the physical layer. Of relevance is the work [12] in which a method was proposed using a massive MIMO channel as the key between the sender and the desired receiver, but this method requires the transmitter to know the channel state information for precoding which may be impractical for some scenarios.…”
Section: ) Security Does Not Rely On Channel Information and Eavesdropper Statusmentioning
confidence: 99%