Efficient security mechanisms for the distributed wireless sensor networks

Prasan Kumar Sahoo*, Jonathan Jen Rong Chen, Ping Tai Sun

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

In this paper, a secure data communication environment for the three-tiered Wireless Sensor Networks (WSNs) that continues to operate correctly in a hostile medium is proposed. Considering the energy and hardware constraints of the sensor nodes, the low complex data confidential and authentication algorithms are proposed. Performance analysis of our protocol shows that it satisfies the energy and hardware limitations of the WSNs and maintains the secure fabrics of the network.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
Pages541-546
Number of pages6
StatePublished - 2005
Externally publishedYes
Event3rd International Conference on Information Technology and Applications, ICITA 2005 - Sydney, Australia
Duration: 04 07 200507 07 2005

Publication series

NameProceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
VolumeII

Conference

Conference3rd International Conference on Information Technology and Applications, ICITA 2005
Country/TerritoryAustralia
CitySydney
Period04/07/0507/07/05

Fingerprint

Dive into the research topics of 'Efficient security mechanisms for the distributed wireless sensor networks'. Together they form a unique fingerprint.

Cite this