2016
DOI: 10.1109/comst.2015.2459691
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks

Abstract: Cryptographic primitives are fundamental building blocks for designing security protocols to achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say that the selection and integration of appropriate cryptographic primitives into the security protocols determines the largest part of the efficiency and energy consumption of the Wireless sensor network (WSN). There are a number of surveys on security issues on WSNs, which, however, didn't focus on public-key cryptographic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
53
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 102 publications
(54 citation statements)
references
References 172 publications
0
53
0
1
Order By: Relevance
“…Among the available security protection mechanisms for WMSN, cryptography is an effective technique that can provide confidentiality, integrity and authenticity to sensed data and sensor nodes [8][9][10]. In short, cryptography is the set of techniques for transforming original unprotected information into a set of unreadable secure data, which can only be properly read by the correct recipient.…”
Section: Introductionmentioning
confidence: 99%
“…Among the available security protection mechanisms for WMSN, cryptography is an effective technique that can provide confidentiality, integrity and authenticity to sensed data and sensor nodes [8][9][10]. In short, cryptography is the set of techniques for transforming original unprotected information into a set of unreadable secure data, which can only be properly read by the correct recipient.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Cellular Message Encryption Algorithm has been used in cellular networks [8] and KASUMI has been used in 3G networks [9] while wireless local area networks (WLANs) have adopted Wired Equivalent Privacy (WEP) [10], Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) [11]. However, the traditional cryptographic methods may not be feasible to WSNs due to the following constraints: 1) the limited battery power of sensor nodes; (2) the inferior computational capability of sensor nodes and (3) the difficulty of managing distributed sensor nodes in a centralized way, which is however necessary for many encryption algorithms [12]. …”
Section: Introductionmentioning
confidence: 99%
“…In turn, key agreement protocols like Diffie-Hellman and TLS (Transport Layer Security) are protection measures used in [12,16,[20][21][22]. Such trend is expected since protection mechanisms related to cryptographic premises are cornerstones for implementing secure systems [32]. However, the management of shared secret keys can be complex and expensive in practical scenarios [23].…”
Section: Related Workmentioning
confidence: 99%