Security for Wireless Sensor Networks in Military Operations

被引:0
作者
Gupta, Rajat [1 ]
Singh, Pallavi [1 ]
Sultania, Kaushal [1 ]
Gupta, Archit [1 ]
机构
[1] VIT Univ, Vellore, Tamil Nadu, India
来源
2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT) | 2013年
关键词
Wireless sensor network; public key cryptosystem; Elliptical Curve Cryptography; Military; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The communication in military is vital for distribution of commands, logistical information and proper functionality of all units. It is must to have a secure channel through which critical information is exchanged in real time and privacy of information is maintained. Wireless sensor network can be used in military application for monitoring militant activities like tracking enemies and force protection. Wireless sensor network has set of distributes sensors nodes which are connected to each other. These sensor nodes are low powered, low cost, small in size and can do limited amount of computation. But wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping in communication links and man in the middle or reply to a message. To ensure security, messages from wireless sensor networks must be encrypted. Many key agreement schemes have been proposed to ensure security but most of them are quite complex. In this paper we are proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network. This will improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.
引用
收藏
页数:6
相关论文
共 12 条
[1]  
Aboud Sattar J, 2009, EFFICIENT METHOD ATT
[2]  
[Anonymous], 2010, P 26 IEEE CONV ISR E
[3]  
BRICKELL EF, 1990, LECT NOTES COMPUT SC, V435, P368
[4]   Linear systolic multiplier/squarer for fast exponentiation [J].
Lee, KJ ;
Yoo, KY .
INFORMATION PROCESSING LETTERS, 2000, 76 (03) :105-111
[5]  
Lipson J.D., 1981, Elements of algebra and algebraic computing
[6]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[7]  
Schneier B., 2015, APPL CRYPTOGRAPHY, VSecond
[8]  
Scripcariu L, 2005, 2005 INT C MICR COMP, P83
[9]   How to compute modular exponentiation with large operators based on the right-to-left binary algorithm [J].
Sun, DZ ;
Cao, ZF ;
Sun, Y .
APPLIED MATHEMATICS AND COMPUTATION, 2006, 176 (01) :280-292
[10]   Dual RSA and its security analysis [J].
Sun, Hung-Min ;
Wu, Mu-En ;
Ting, Wei-Chi ;
Hinek, M. Jason .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (08) :2922-2933