Protection of Wireless Sensor Networks using Cryptographic Schemes

  • Unique Paper ID: 144938
  • PageNo: 268-274
  • Abstract:
  • Wireless sensor networks consist of autonomous sensor nodes attached to one or more base stations. As Wireless sensor networks continues to grow, they become vulnerable to attacks and hence the need for effective security mechanisms. Identification of suitable cryptography for wireless sensor networks is an important challenge due to limitation of energy, computation capability and storage resources of the sensor nodes. Symmetric based cryptographic schemes do not scale well when the number of sensor nodes increases. Hence public key based schemes are widely used. We present here two public – key based algorithms, RSA and Elliptic Curve Cryptography (ECC) and found out that ECC have a significant advantage over RSA as it reduces the computation time and also the amount of data transmitted and stored

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144938,
        author = {S Srikanth},
        title = {Protection of Wireless Sensor Networks using Cryptographic Schemes},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {6},
        pages = {268-274},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144938},
        abstract = {Wireless sensor networks consist of autonomous sensor nodes attached to one or more base stations. As Wireless sensor networks continues to grow, they become vulnerable to attacks and hence the need for effective security mechanisms. Identification of suitable cryptography for wireless sensor networks is an important challenge due to limitation of energy, computation capability and storage resources of the sensor nodes. Symmetric based cryptographic schemes do not scale well when the number of sensor nodes increases. Hence public key based schemes are widely used. We present here two public – key based algorithms, RSA and Elliptic Curve Cryptography (ECC) and found out that ECC have a significant advantage over RSA as it reduces the computation time and also the amount of data transmitted and stored},
        keywords = {Wireless Sensor Network, Cryptographic Schemes, ECC, Eliptic Curve Cryptography},
        month = {},
        }

Cite This Article

Srikanth, S. (). Protection of Wireless Sensor Networks using Cryptographic Schemes. International Journal of Innovative Research in Technology (IJIRT), 4(6), 268–274.

Related Articles