Security management in wireless sensor networks with a public key based scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifi...
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer-Verlag
2007
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/716/ http://irep.iium.edu.my/716/1/APNOMS_2007-PKC.pdf |
| _version_ | 1848775746042986496 |
|---|---|
| author | Pathan, Al-Sakib Khan Ryu, Jae Hyun Haque, Md. Mokammel Hong, Choong Seon |
| author2 | Ata, Shingo |
| author_facet | Ata, Shingo Pathan, Al-Sakib Khan Ryu, Jae Hyun Haque, Md. Mokammel Hong, Choong Seon |
| author_sort | Pathan, Al-Sakib Khan |
| building | IIUM Repository |
| collection | Online Access |
| description | This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and
performance evaluations show that, our approach is viable with the specifications of today's Berkley/Crossbow MICA2dot motes. |
| first_indexed | 2025-11-14T14:19:05Z |
| format | Book Chapter |
| id | iium-716 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:19:05Z |
| publishDate | 2007 |
| publisher | Springer-Verlag |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-7162011-08-02T07:08:55Z http://irep.iium.edu.my/716/ Security management in wireless sensor networks with a public key based scheme Pathan, Al-Sakib Khan Ryu, Jae Hyun Haque, Md. Mokammel Hong, Choong Seon Q Science (General) QA76 Computer software This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifications of today's Berkley/Crossbow MICA2dot motes. Springer-Verlag Ata, Shingo Hong, Choong Seon 2007 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/716/1/APNOMS_2007-PKC.pdf Pathan, Al-Sakib Khan and Ryu, Jae Hyun and Haque, Md. Mokammel and Hong, Choong Seon (2007) Security management in wireless sensor networks with a public key based scheme. In: Proceedings of Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Lecture Notes in Computer Science, 4773 . Springer-Verlag, Berlin, Germany, pp. 503-506. ISBN 9783540754756 http://www.springerlink.com/content/j673h7t60837v67n/about/ DOI: 10.1007/978-3-540-75476-3_51 |
| spellingShingle | Q Science (General) QA76 Computer software Pathan, Al-Sakib Khan Ryu, Jae Hyun Haque, Md. Mokammel Hong, Choong Seon Security management in wireless sensor networks with a public key based scheme |
| title | Security management in wireless sensor networks with a public key based scheme |
| title_full | Security management in wireless sensor networks with a public key based scheme |
| title_fullStr | Security management in wireless sensor networks with a public key based scheme |
| title_full_unstemmed | Security management in wireless sensor networks with a public key based scheme |
| title_short | Security management in wireless sensor networks with a public key based scheme |
| title_sort | security management in wireless sensor networks with a public key based scheme |
| topic | Q Science (General) QA76 Computer software |
| url | http://irep.iium.edu.my/716/ http://irep.iium.edu.my/716/ http://irep.iium.edu.my/716/ http://irep.iium.edu.my/716/1/APNOMS_2007-PKC.pdf |