Efficient combined security system for wireless sensor network

被引:8
作者
Fayed, N. S. [1 ]
Daydamoni, E. M. [1 ]
Atwan, A. [1 ]
机构
[1] Mansoura Univ, Fac Computers & Informat, Dept Informat Technol, Mansoura, Egypt
关键词
Security; Wireless sensor networks; Energy cost; Cryptographic key establishment; Kerberos;
D O I
10.1016/j.eij.2012.09.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Networks (WSNs) need effective security mechanisms because these networks deployed in hostel unattended environments. There are many parameters affect selecting the security mechanism as its speed and energy consumption. This paper presents a combined security system for WSN that enhance the speed of the network and it is energy consumption. This system combines two strong protocols, Lightweight Kerberos and Elliptic Curve Menezes-Qu-Vanstone (ECMQV). The simulation results demonstrate that the combined system can enlarge the life time for wireless sensor networks, enhance its security, and increase its speed. (C) 2012 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:185 / 190
页数:6
相关论文
共 18 条
[1]   Development platform for self-organizing wireless sensor networks [J].
Agre, JR ;
Clare, LP ;
Pottie, GJ ;
Romanov, NP .
UNATTENDED GROUND SENSOR TECHNOLOGIES AND APPLICATIONS, 1999, 3713 :257-268
[2]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[3]  
BLAKE I, 2005, ADV ELLIPTIC CURVE C
[4]  
Blake I., 1999, ELLIPTIC CURVES CRYP
[5]  
Carman D., 2000, 00010 NAI LABS
[6]  
Cheng L, 2011, IEEE INT SYMP CIRC S, P5
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
GroOschadl J, 2007, P 2 ACM S INF COMP C, P380, DOI DOI 10.1145/1229285.1229334
[9]  
Kohl J, 1993, INTERNET DRAFT RFC 1
[10]   An efficient protocol for authenticated key agreement [J].
Law, L ;
Menezes, A ;
Qu, MH ;
Solinas, J ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) :119-134