Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks

Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile environments. Basically sensor networks are application dependent. Wireless sensor network (WSN) applications can be classified into two - event based and Continuous monitoring. This paper focuses on continuous monitoring application. One of the major challenges of wireless sensor network is security. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above said challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy consumed by a node, so there is a need to reduce the energy thus the cost incurred by security algorithm.In this paper the performance of the RSA cryptography algorithm is compared with the ELGAMAL cryptography algorithm by evaluating their energy efficiency and network lifetime. A cluster based wireless network topology environment is constructed and their performances were compared in NS2 and the result shows that RSA algorithm consumes less energy than ELGAMAL algorithm.

[1]  Zhaohui Wu,et al.  Encryption algorithms comparisons for wireless networked sensors , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[2]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[3]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[6]  Chen Deng,et al.  An Enhanced Polynomial-Based Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing.

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[9]  Fang Liu,et al.  iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[10]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[11]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[12]  Zhi Zhang,et al.  A Cluster Based Secure Cryptography for Sensor Networks , 2008, 2008 International Conference on Computer Science and Software Engineering.