Implementation and evaluation of wireless sensor network security using public-key algorithm (FUSION)
Wireless Sensor Network is a developing technology that shows great promise. It is employed in many application areas such as environmental monitoring, battle field strategy planning, and hospital patient monitoring. It is necessary for some applications of wireless sensor network to understand the...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2013
|
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/10984 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Summary: | Wireless Sensor Network is a developing technology that shows great promise. It is employed in many application areas such as environmental monitoring, battle field strategy planning, and hospital patient monitoring. It is necessary for some applications of wireless sensor network to understand the behavior of their networks in simulated environment therefore there is an urgent need to develop simulation platforms that are useful to explore the networking issues and the distributed computing aspects of wireless sensor networks as well as its security issues. However, the need of wireless sensor networks to protect sensitive data like reconnaissance information and targeting systems in the military and monitoring patient data for hospitals show that effective security protocols are a must. His paper shows the implementation and evaluation of three existing security protocols: TinySec, LiSP and SPINS, and a developed security protocol, FUSION in OMNeT++ simulation framework. To verify the security protocol's functionalities, a series of tests are conducted. Wireless sensor address issues regarding data integrity, data authentication, data confidentiality and security of key distribution. One of these tests measures the protocol's efficiency in terms of speed. Results show that FUSION takes ).815s in re-computing 128 bytes of data Message Authentication Code (MAC) due to the implementation of public key algorithm. |
---|