2013
DOI: 10.1155/2013/740392
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

Abstract: Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power. Thus, many security methods are trying to solve the problem of security in wireless sensor networks. Many of these methods use symmetric cryptography, and others use asymmetric cryptography. Security in WSN demands authentication, confidentiality, integrity, balancing the energy cost, nonreputation, and scalability services. In this paper, we int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Moreover, clustering-based secure routing mechanisms are infeasible for WSNs because of the energy constraints of wireless sensor nodes [ 29 ]. Elliptic curve cryptography (ECC) can be implemented on miniaturized wireless sensor nodes, thereby making public key cryptography (PKC) a realistic possibility for these sensors [ 30 , 31 ]. However, the implementation of PKC-based security at higher layers on top of the efficient primitives is not a simple process because of the unique requirements and characteristics of wireless sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, clustering-based secure routing mechanisms are infeasible for WSNs because of the energy constraints of wireless sensor nodes [ 29 ]. Elliptic curve cryptography (ECC) can be implemented on miniaturized wireless sensor nodes, thereby making public key cryptography (PKC) a realistic possibility for these sensors [ 30 , 31 ]. However, the implementation of PKC-based security at higher layers on top of the efficient primitives is not a simple process because of the unique requirements and characteristics of wireless sensor nodes.…”
Section: Related Workmentioning
confidence: 99%