2009 Second International Conference on Information and Computing Science 2009
DOI: 10.1109/icic.2009.10
|View full text |Cite
|
Sign up to set email alerts
|

The Public Key Encryption to Improve the Security on Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Figure 7 illustrates the experimental environment/setup for performance measurements. As Figure 7 shows, the communication between senor nodes and was based on our proposed scheme, while the communication between sensor nodes * and * was based on the existing ECC AES scheme [8].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 7 illustrates the experimental environment/setup for performance measurements. As Figure 7 shows, the communication between senor nodes and was based on our proposed scheme, while the communication between sensor nodes * and * was based on the existing ECC AES scheme [8].…”
Section: Resultsmentioning
confidence: 99%
“…An RSA-based asymmetric algorithm was used to solve the problem of information security in wireless sensor network [8]. This encryption algorithm contains two phrases: a sensor node to shake hand with another sensor node in which the two sensor nodes setup a session key; the use of the session key for data encryption.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers are working on the reduction of co mputational co mplexity of the cryptographic algorith ms [17]. Periodic updation of the keys in the network is recommended to protect the network fro m eavesdroppers [18]. The advantage in using RSA cryptographic algorith m is "the size of the message won"t be increased".…”
Section: Security Features Of Tselmentioning
confidence: 99%
“…Authors in [2] present an authenticated encryption scheme by using hashing method to ensure message integrity. In [5], the authors suggest using a combination of symmetric (shared key) and asymmetric (Public Key) encryption algorithms simultaneously to ensure secure protection of sensed data. As they also declared that: symmetric key cryptography can be easily extracted by an active attack.…”
Section: Related Workmentioning
confidence: 99%