Security management in wireless sensor networks with a public key based scheme

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifications of today's Berkley/Crossbow MICA2dot motes. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Pathan, A. S. K., Ryu, J. H., Haque, M. M., & Hong, C. S. (2007). Security management in wireless sensor networks with a public key based scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4773 LNCS, pp. 503–506). Springer Verlag. https://doi.org/10.1007/978-3-540-75476-3_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free