Public Key Cryptography and Hashing
(Simulation & Algorithm) Syed Osama Meraj Department of Computer Science Mohammad Ali Jinnah University dreamzunlimited81@hotmail.com Sir. Rizwan ur Rashid Mohammad Ali Jinnah University rizwan@jinnah.edu
1.Abstract:
The need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. Nowadays research and applications of Wireless Sensor Network have attracted people’s attention. Since sensor nodes in WSN are resource-constrained, the security solutions for WSN become difficult. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages, data integrity verification which prevents modification of data from going undetected. Traditional security measures require heavy communication and computational resources and cryptographically complex security solutions for sensor networks are not suitable for WSN. In this paper, I have proposed an algorithm for node authentication by using cryptographic hash function and public key cryptography technique in Wireless Sensor Network .Which can fulfill confidential communication and mutual authentication between nodes, enhances scalability, node authentication security and prevents node impersonation.
2.Introduction:
Wireless sensor networks consist of a large number of such sensor nodes and are able to collect and disseminate data in areas where ordinary networks are unsuitable for environment. Wireless sensor networks use new technology and standards. They involve small, energy-efficient devices, hardware/software co-design, and
References: [1] KunZhang, Cuirong Wang “A new Group Key Management Scheme with Simple Hash Based Authentication for Wireless Sensor Networks” 2010 International Conference on Computer Design and applications (ICCDA 2010) IEEE 2010. [9] Chong & Kumar, 2003; Akyildiz, Su, Sankarasubramaniam & Cayirci, 2002; Culler, Estrin & Srivastava, 2004 [10] Garth V [20] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology," in Proc. ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64, 2004. [24]“Adaptive Authentication Mechanism using Node Reputation on Mobile Medical Sensor Networks” Mihui Kim and Kijoon Chae Feb. 17-20, 2008 ICACT 2008 [25]”Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes” Keith M [26]”An Efficient Authentication Strategy for Reprogramming of Sensor Networks” Jin Tan, JinTan Chen, YanQiu Liu, 2007 International Conference on Computational Intelligence and Security, 2007 IEEE. [29] “Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks” Roberto Di Pietro · Luigi V. Mancini · Alessandro Mei, Wireless Netw (2006) 12:709–721 Springer.