ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)

Publication Date:

Authors : ;

Page : 297-305

Keywords : Base Station; Security; Sensor networks; RSA;

Source : Downloadexternal Find it from : Google Scholarexternal


As sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that security concern be addressed from the beginning of the system. But sensor networks also introduce severe resource constraints due to their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor networks. There has to be some comprise between the security and the energy. Many symmetric protocols have been implemented for sensor networks. The major problem in symmetric key security protocol is the key distribution problem. But asymmetric protocol like RSA has not been implemented due to high power constrain and for memory issue. In this research paper, RSA can be implemented for sensor in an efficient manner by using optimized computation. The problem of using power function for large encryption and decryption key for encryption and decryption method respectively has been optimized. This reduces the cost of computation for RSA and also designs a model to reduce the power consumption of the cluster head by decrypting the information message at the base station of the cluster node which uses the public key of its corresponding cluster node to encrypt the message.

Last modified: 2014-06-19 15:43:31