Public key cryptography in resource-constrained WSN
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. By this...
| Main Authors: | , |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
Kyung Hee University, South Korea
2008
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/636/ http://irep.iium.edu.my/636/1/Tech_Report_2008N2-SP-NL.pdf |
| _version_ | 1848775735916888064 |
|---|---|
| author | Pathan, Al-Sakib Khan Hong, Choong Seon |
| author_facet | Pathan, Al-Sakib Khan Hong, Choong Seon |
| author_sort | Pathan, Al-Sakib Khan |
| building | IIUM Repository |
| collection | Online Access |
| description | In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. Here, we talk about the notion of public key cryptography in WSN, its applicability, challenges in its implementation, and present a detailed study of the significant works on PKC in WSN. |
| first_indexed | 2025-11-14T14:18:56Z |
| format | Monograph |
| id | iium-636 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:18:56Z |
| publishDate | 2008 |
| publisher | Kyung Hee University, South Korea |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-6362011-08-01T07:52:21Z http://irep.iium.edu.my/636/ Public key cryptography in resource-constrained WSN Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. Here, we talk about the notion of public key cryptography in WSN, its applicability, challenges in its implementation, and present a detailed study of the significant works on PKC in WSN. Kyung Hee University, South Korea 2008 Monograph NonPeerReviewed application/pdf en http://irep.iium.edu.my/636/1/Tech_Report_2008N2-SP-NL.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Public key cryptography in resource-constrained WSN. Technical Report. Kyung Hee University, South Korea, South Korea. |
| spellingShingle | Q Science (General) QA76 Computer software Pathan, Al-Sakib Khan Hong, Choong Seon Public key cryptography in resource-constrained WSN |
| title | Public key cryptography in resource-constrained WSN |
| title_full | Public key cryptography in resource-constrained WSN |
| title_fullStr | Public key cryptography in resource-constrained WSN |
| title_full_unstemmed | Public key cryptography in resource-constrained WSN |
| title_short | Public key cryptography in resource-constrained WSN |
| title_sort | public key cryptography in resource-constrained wsn |
| topic | Q Science (General) QA76 Computer software |
| url | http://irep.iium.edu.my/636/ http://irep.iium.edu.my/636/1/Tech_Report_2008N2-SP-NL.pdf |