Quick Search:

Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations

Singarathnam, Dharshika, Ganesan, Swathi ORCID logoORCID: https://orcid.org/0000-0002-6278-2090, Pokhrel, Sangita ORCID logoORCID: https://orcid.org/0009-0008-2092-7029 and Somasiri, Nalinda ORCID logoORCID: https://orcid.org/0000-0001-6311-2251 (2023) Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations. In: 2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS). IEEE, pp. 176-180

[thumbnail of 2023172500.pdf] Text
2023172500.pdf - Accepted Version
Restricted to Repository staff only until 26 September 2025.

Abstract

Wireless sensor networks (WSNs) play a crucial role in environmental monitoring and data collection. However, ensuring data security in WSNs poses challenges due to the vulnerabilities of wireless communication channels. In this paper, we address this concern by exploring the application of cryptographic techniques to enhance data security in WSNs. Considering the limited sensor power, computing power, and storage resources, we propose a novel approach that evaluates the suitability of symmetric and asymmetric cryptographic algorithms in WSNs. Through performance comparisons based on computation power and storage capacity requirements, we identify key insights for selecting appropriate encryption algorithms in WSNs. Our findings emphasize the importance of considering the specific requirements and constraints of WSN applications, highlighting the efficiency of symmetric key-based encryption algorithms in resource-constrained environments and the stronger security and key distribution mechanisms provided by ECC-based asymmetric encryption algorithms for secure communication among multiple nodes. This research contributes to the existing knowledge by offering an effective solution to enhance data security in WSNs while considering computational and storage limitations

Item Type: Book Section
Additional Information: © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”
Status: Published
DOI: 10.1109/ICSECS58457.2023.10256341
School/Department: London Campus
URI: https://ray.yorksj.ac.uk/id/eprint/8713

University Staff: Request a correction | RaY Editors: Update this record