S-PkSec: an asymmetric key based security management scheme for sensor network operation
This paper proposes a public key based management scheme for secure sensor network operation namely S-PkSec (Public Key Based Security for Sensor Networks) and emphasizes detailed comparison with some similar type of schemes. Although there was a wide held belief of the incompatibility of public key...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/735/1/S-PkSec_An_Asymmetric_Key_Based_Security_Management_Scheme_for_Sensor_Network_Operation.pdf http://irep.iium.edu.my/735/ http://dpnm.postech.ac.kr/conf/knom2008/Proceeding/papers/TS6-5.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.735 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.7352011-08-01T07:56:29Z http://irep.iium.edu.my/735/ S-PkSec: an asymmetric key based security management scheme for sensor network operation Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software This paper proposes a public key based management scheme for secure sensor network operation namely S-PkSec (Public Key Based Security for Sensor Networks) and emphasizes detailed comparison with some similar type of schemes. Although there was a wide held belief of the incompatibility of public key cryptographic (PKC) schemes for wireless sensor networks (WSNs), some recent works have shown that, PKC or asymmetric key based schemes could be implemented for such networks in some ways. The major challenge of employing a PKC scheme in sensor network is posed by the limitations of resources of the tiny sensors. Considering this feature of the sensors, we enhance our previous work [1] with some effective comparisons and energy analysis with other two established asymmetric key based protocols. S-PkSec comprises basically of two parts; a key handshaking scheme based on simple linear operations and the derivation of decryption key by a receiver node. S-PkSec allows both base-station-to-node or node-to-base-station secure communications, and node-to-node secure communications. Analysis and simulation results show that, our proposed architecture ensures a good level of security for communications in the network and could effectively be implemented using the limited computation, memory and energy budgets of the current generation sensor nodes. 2008 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/735/1/S-PkSec_An_Asymmetric_Key_Based_Security_Management_Scheme_for_Sensor_Network_Operation.pdf Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) S-PkSec: an asymmetric key based security management scheme for sensor network operation. In: KNOM (Korean Network Operations and Management) Conference 2008, April 24-25, 2008, Changwon, Korea. http://dpnm.postech.ac.kr/conf/knom2008/Proceeding/papers/TS6-5.pdf |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
Q Science (General) QA76 Computer software |
spellingShingle |
Q Science (General) QA76 Computer software Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon S-PkSec: an asymmetric key based security management scheme for sensor network operation |
description |
This paper proposes a public key based management scheme for secure sensor network operation namely S-PkSec (Public Key Based Security for Sensor Networks) and emphasizes detailed comparison with some similar type of schemes. Although there was a wide held belief of the incompatibility of public key cryptographic (PKC) schemes for wireless sensor networks (WSNs), some recent works have shown that, PKC or asymmetric key based schemes could be implemented for such networks in some ways. The major challenge of employing a PKC scheme in sensor network is posed by the limitations of resources of the tiny sensors. Considering this feature of the sensors, we enhance our previous work [1] with some effective comparisons and energy analysis with other two established asymmetric key based protocols. S-PkSec comprises basically of two parts; a key handshaking scheme based on simple linear operations and the derivation of decryption key by a receiver node. S-PkSec allows both base-station-to-node or node-to-base-station secure communications, and node-to-node secure communications. Analysis and simulation results show that, our proposed architecture ensures a good level of security for communications in the network and could effectively be implemented using the limited computation, memory and energy budgets of the current generation sensor nodes. |
format |
Conference or Workshop Item |
author |
Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon |
author_facet |
Haque, Md. Mokammel Pathan, Al-Sakib Khan Hong, Choong Seon |
author_sort |
Haque, Md. Mokammel |
title |
S-PkSec: an asymmetric key based security management scheme for sensor network operation |
title_short |
S-PkSec: an asymmetric key based security management scheme for sensor network operation |
title_full |
S-PkSec: an asymmetric key based security management scheme for sensor network operation |
title_fullStr |
S-PkSec: an asymmetric key based security management scheme for sensor network operation |
title_full_unstemmed |
S-PkSec: an asymmetric key based security management scheme for sensor network operation |
title_sort |
s-pksec: an asymmetric key based security management scheme for sensor network operation |
publishDate |
2008 |
url |
http://irep.iium.edu.my/735/1/S-PkSec_An_Asymmetric_Key_Based_Security_Management_Scheme_for_Sensor_Network_Operation.pdf http://irep.iium.edu.my/735/ http://dpnm.postech.ac.kr/conf/knom2008/Proceeding/papers/TS6-5.pdf |
_version_ |
1643604661434843136 |