Reference Hub1
Applied Cryptography in Wireless Sensor Networks

Applied Cryptography in Wireless Sensor Networks

Dulal C. Kar, Hung L. Ngo, Clifton J. Mulkey
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
DOI: 10.4018/978-1-61520-783-1.ch006
Cite Chapter Cite Chapter

MLA

Kar, Dulal C., et al. "Applied Cryptography in Wireless Sensor Networks." Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, IGI Global, 2011, pp. 146-167. https://doi.org/10.4018/978-1-61520-783-1.ch006

APA

Kar, D. C., Ngo, H. L., & Mulkey, C. J. (2011). Applied Cryptography in Wireless Sensor Networks. In H. Nemati & L. Yang (Eds.), Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (pp. 146-167). IGI Global. https://doi.org/10.4018/978-1-61520-783-1.ch006

Chicago

Kar, Dulal C., Hung L. Ngo, and Clifton J. Mulkey. "Applied Cryptography in Wireless Sensor Networks." In Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, 146-167. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1.ch006

Export Reference

Mendeley
Favorite

Abstract

It is challenging to secure a wireless sensor network (WSN) because of its use of inexpensive sensor nodes of very limited processing capability, memory capacity, and battery life that preclude using traditional security solutions. Due to perceived excessive computational and architectural overhead, public key algorithms are altogether avoided for WSNs. Currently security in WSNs is provided using only symmetric key cryptography, but it requires keys to be embedded in sensor nodes before deployment and the entire network has to go through a key establishment phase after deployment. Accordingly, in this chapter, we summarize, discuss, and evaluate recent results reported in literature on sensor network security protocols such as for key establishment, random key pre-distribution, data confidentiality, and broadcast authentication. In addition, we discuss promising research results in public key cryptography for WSNs, particularly related to elliptic curve cryptography and its application for identity based encryption.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.