Abstract

Problem statement: The Security in WSN has become a challenge because of its inherent limitations of resources imposed on the sensor nodes. Authentication and key management scheme allows WSNs to be used with confidence and maintains integrity of data in sensor networks. Approach: In the WSN limited resource scenario the generation of public key done and are randomly pre distributed while deploying the sensor nodes. Since the sensor nodes are limited by energy it needs to concentrate on fast decryption and verification of message. In order to enable the fast decryption we have proposed a novel method which uses three algorithms hybrid to achieve the increase in decryption speed which in turn reduces the energy used for computation and enhances its performance compared with the existing authentication using classical RSA algorithm. Results: The proposed Enhanced Variant of RSA with CRT using Garner’s algorithm to achieve fast decryption speed and provides better performance when compared to the existing RSA. The private key is generated and passed so that the receiver node need not generate it which consumes more computational cost, power and memory at the decryption stage. Also we have done the signing and verification which avoids the message spoofing attack and enable message confidentiality. Further the ERSACRT is designed to counter measure to few attacks possible on RSA. We implemented the ERSACRT in java and tested for system parameters like memory, time, speed and efficiency and compared with that of RSA. Conclusion/Recommendation: The proposed algorithm ERSACRT is efficient and secured along with improved counter measures for secured communication in WSN with reduced energy and computational time.

Highlights

  • IntroductionThe security in and issues of security in wireless sensor networks

  • The security in and issues of security in wireless sensor networks. They Wireless Sensor Networks (WSN) has become a critical issue because of the severe are susceptible to a variety of attacks, including node resource constraints like limited computational capacity, capture, physical tampering and denial of service, limited battery power consumption and memory imposed prompting a range of fundamental research challenges, on the sensor nodes

  • Problem identification: There are many key management schemes are available for the authentication, we proposed a key management scheme called Enhanced Variant of RSA with Chinese Remainder Theorem (CRT) using Garner’s algorithm to achieve fast decryption speed and provides better performance when compared to the existing RSA

Read more

Summary

Introduction

The security in and issues of security in wireless sensor networks They WSN has become a critical issue because of the severe are susceptible to a variety of attacks, including node resource constraints like limited computational capacity, capture, physical tampering and denial of service, limited battery power consumption and memory imposed prompting a range of fundamental research challenges, on the sensor nodes. It appears that they are more an attacker can eavesdrop on, inject or alter the prone to attacks than wired networks. Applied Sci., 9 (10): 1660-1667, 2012 only makes sure the communicating nodes possess the necessary keys, at the same time protecting the confidentiality, integrity and authenticity of the communicated data in the wireless sensor networks

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.