Analysis of security and key management schemes for authenticated broadcast in heterogeneous wireless sensor networks

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security in wireless sensor networks (WSN) is a critical issue due to the inherent limitations of computational capacity, storage capacity and power usage. Packets are dropped or discarded completely, or selectively forwarded by an anonymous party. Also the network is flooded with global suspicious broadcasts. These kinds of attacks may be avoided when using multi path and authenticated broadcasts, which has to be facilitated by the underlying key management architecture. Key management only makes sure the communicating nodes possess the necessary keys, at the same time providing the confidentiality, integrity and authenticity of the communicated data. The proposed work, made an effort to survey the well-known security issues in WSNs and study the various asymmetric key or public key algorithms which are used for key distribution as well as encryption/decryption in sensor network for authenticated message broad cast. Based on the analysis, proposed a new method which will improves the performance of an existing RSA algorithm by using Chinese Remainder Theorem (CRT) algorithm for decryption phase. Also it offers countermeasures for the attacks in the network layer of WSN. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Kalyani, P., & Chellappan, C. (2011). Analysis of security and key management schemes for authenticated broadcast in heterogeneous wireless sensor networks. In Communications in Computer and Information Science (Vol. 169 CCIS, pp. 580–587). https://doi.org/10.1007/978-3-642-22577-2_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free