Design Methodologies: A Security Aspect for Wireless Sensor Network

A Wireless Sensor Network (WSN) consists of a large number of tiny sensor nodes which has sensing, computation, and wireless communications capabilities with other nodes. These sensors are capable of detecting the data from an environment in which they are deployed, processes those data and transmits it to the Base Station (BS).Whenever a node wants to send or transmit some data over the network, this data to be sent from the sender side needs to be encrypted, and decrypts it at the receiver side. The encryption and decryption is done through various techniques. This paper focuses on the design architecture and algorithms for integrated sensor network security using Elliptic Curve Cryptography (ECC).

[1]  Albert Y. Zomaya,et al.  Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[2]  Kalpana Sharma,et al.  Power-efficient Routing & Increased Yield Approach For WSNs , 2010, ArXiv.

[3]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[4]  Ratna Dutta,et al.  Secure and Efficient Group Key Agreements for Cluster Based Networks , 2009, Trans. Comput. Sci..

[5]  Mingxing He,et al.  Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks , 2006, CANS.

[6]  Georgios Kambourakis,et al.  A Survey on Cluster-Based Group Key Agreement Protocols for WSNs , 2011, IEEE Communications Surveys & Tutorials.

[7]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .

[8]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[9]  Chik How Tan,et al.  Energy-efficient and scalable group key agreement for large ad hoc networks , 2005, PE-WASUN '05.

[10]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[11]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[12]  Stefan Fischer,et al.  A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.

[13]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[14]  Subir Kumar Sarkar,et al.  Issues in Wireless Sensor Networks , 2008 .

[15]  Robert H. Deng,et al.  Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient , 2003, ACNS.