Security management in wireless sensor networks with a public key based scheme

This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifi...

Full description

Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Ryu, Jae Hyun, Haque, Md. Mokammel, Hong, Choong Seon
Other Authors: Ata, Shingo
Format: Book Chapter
Language:English
Published: Springer-Verlag 2007
Subjects:
Online Access:http://irep.iium.edu.my/716/
http://irep.iium.edu.my/716/1/APNOMS_2007-PKC.pdf
_version_ 1848775746042986496
author Pathan, Al-Sakib Khan
Ryu, Jae Hyun
Haque, Md. Mokammel
Hong, Choong Seon
author2 Ata, Shingo
author_facet Ata, Shingo
Pathan, Al-Sakib Khan
Ryu, Jae Hyun
Haque, Md. Mokammel
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
building IIUM Repository
collection Online Access
description This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifications of today's Berkley/Crossbow MICA2dot motes.
first_indexed 2025-11-14T14:19:05Z
format Book Chapter
id iium-716
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:19:05Z
publishDate 2007
publisher Springer-Verlag
recordtype eprints
repository_type Digital Repository
spelling iium-7162011-08-02T07:08:55Z http://irep.iium.edu.my/716/ Security management in wireless sensor networks with a public key based scheme Pathan, Al-Sakib Khan Ryu, Jae Hyun Haque, Md. Mokammel Hong, Choong Seon Q Science (General) QA76 Computer software This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encryption and decryption of data. Our analysis and performance evaluations show that, our approach is viable with the specifications of today's Berkley/Crossbow MICA2dot motes. Springer-Verlag Ata, Shingo Hong, Choong Seon 2007 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/716/1/APNOMS_2007-PKC.pdf Pathan, Al-Sakib Khan and Ryu, Jae Hyun and Haque, Md. Mokammel and Hong, Choong Seon (2007) Security management in wireless sensor networks with a public key based scheme. In: Proceedings of Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Lecture Notes in Computer Science, 4773 . Springer-Verlag, Berlin, Germany, pp. 503-506. ISBN 9783540754756 http://www.springerlink.com/content/j673h7t60837v67n/about/ DOI: 10.1007/978-3-540-75476-3_51
spellingShingle Q Science (General)
QA76 Computer software
Pathan, Al-Sakib Khan
Ryu, Jae Hyun
Haque, Md. Mokammel
Hong, Choong Seon
Security management in wireless sensor networks with a public key based scheme
title Security management in wireless sensor networks with a public key based scheme
title_full Security management in wireless sensor networks with a public key based scheme
title_fullStr Security management in wireless sensor networks with a public key based scheme
title_full_unstemmed Security management in wireless sensor networks with a public key based scheme
title_short Security management in wireless sensor networks with a public key based scheme
title_sort security management in wireless sensor networks with a public key based scheme
topic Q Science (General)
QA76 Computer software
url http://irep.iium.edu.my/716/
http://irep.iium.edu.my/716/
http://irep.iium.edu.my/716/
http://irep.iium.edu.my/716/1/APNOMS_2007-PKC.pdf