z-logo
open-access-imgOpen Access
Evaluation key generator of Multiple Asymmetric methods in Wireless Sensor Network (WSNs)
Author(s) -
Aseel Hamoud Hamza,
Saif Al-Alak
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1804/1/012096
Subject(s) - computer science , wireless sensor network , encryption , computer network , key distribution in wireless sensor networks , key generation , key (lock) , symmetric key algorithm , distributed computing , public key cryptography , hash function , wireless network , computer security , wireless , telecommunications
The wireless sensor network (WSNs) is constructed with a combination of the sensor nodes and the sink nodes. WSNs applied in many applications. The Security in WSNs is necessary because of limitations of storage, computing capacity, power use. Encryption is one of the most important tools utilized to supply the security services for WSNs. Asymmetric and symmetric encryption algorithm can be utilized in the WSNs structure to supply the security. The asymmetric key encryption algorithm gives a higher level of the security, but compared to symmetric key encryption, that causes extra sensor overhead. In this research KCMA method used to generate chains key of twelve experiments of the algorithms (ECC, RSA, ELGamal). These chains merged with hash function SHA2 and XOR. Diehard test was utilized in all experiments to evaluate the randomness of the secret key generated, and show it’s more security system. SHA2 was the best as compared with XOR. Also, the work evaluated the performance (time) for the system and throughput network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here