Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power. Thus, many security methods are trying to solve the problem of security in wireless sensor networks. Many of these methods use symmet...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan
Format: Article
Language:English
Published: Wiley 2013-07-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/740392
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power. Thus, many security methods are trying to solve the problem of security in wireless sensor networks. Many of these methods use symmetric cryptography, and others use asymmetric cryptography. Security in WSN demands authentication, confidentiality, integrity, balancing the energy cost, nonreputation, and scalability services. In this paper, we introduce two protocols to address these main security services. The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. The proposed protocols utilize Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), Certification Authority (CA), and Registration Authority (RA) to achieve a reasonable tradeoff.
ISSN:1550-1477