Open Access Open Access  Restricted Access Subscription or Fee Access

Cryptography in Wireless Sensor Networks for Security

Himanshu Monga

Abstract


The future developments of the wireless sensor networks and its applications demands for the efficient and secure communication. For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. This paper provides a review over cryptography schemes being used to dealt with security issues of wireless sensor networks.

Full Text:

PDF

References


K. Akkaya and M. Younis, “A Survey on routing protocols for wireless sensor networks, Ad Hoc networks”, 3(2005), pp 325-349.

Gustavo S. Quirino, Admilson R. L. Riberio and Edward David Moreno “Asymmetrical Encryption in wireless sensor networks”, 8(2012), http;//dx.doi.org/ 10.5772/48464.

E. Shi and A. Perrig, “Designing secure sensor networks”. Wireless communication magazine, 11 (6): pp 37-43, 2004.

Y. Wang, G. Attebeery, and B. Ramamurthy, “A Survey of security issues in wireless sensor networks”, IEEE communication surveys and tutorials, 8(2): pp 2-23, 2006.

Y. Wang, W. Gee, S. Chellappan, Dong Xuan, and Ten H. Laii, “Search-based physical attacks in sensor networks: Modeling and Defense, technical report, department of computer science and engineering, Ohio state university, 2005.

Shish Ahmad, Mohamad Rizwan beg, and Qamar Abbas, “ Energy saving secure framework for sensor network using elliptical curve cryptography Mobile Adhoc networks”, pp 167-172, 2012.

R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography I. secret sharing” , vol. 39, no.4, pp 1121-1132, July.1993.

D. Han Kerson, A. Meneres, S. Vanstone, “Guide to Elliptical curve cryptography”, Springer- Verlag New York, Inc. 2004.

A. J. Menezes, P.C. Van oorschot, S.A. Vanstone, “Handbook of applied cryptography”, 1997.

G. Gaubtaz, J. P. Kaps, and B. Sunar, “Public key cryptography in sensor networks- revisited”, pp 1-17, 2004.

A. S. Wander, N. Gura, H. Eberle, V. Gupta and S.C. Shantz, “Energy analysis of public key cryptography for wireless sensor network”, pp 324-328, 2005.

Zhang Yu, “The Scheme of public key infrastructure for improving wireless sensor networks security”, pp 167-172, 2003.

W. Du, J. Deny, Y. S. Han, Shigang Chen, P. K. Varshney, “A key management scheme for wireless sensor network using deployment knowledge”, 2004.

O. Gungor, F. Chen, C. E. Koksal, “Secrete key generation via localization and mobility”, vol. 6, no. 6, pp 2214-2230, Jun. 2015.

H. Liu, J. Yang, Y. Wang, Y. Chen and C. E. Koksal, “Group key generation”, vol. 13, no. 12, pp 2820-2835, Dec 2014.




DOI: https://doi.org/10.37628/ijtet.v2i2.377

Refbacks

  • There are currently no refbacks.