Research Article Open Access

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

Kalyani Palanisamy and Chellappan

Abstract

Problem statement: The security in Wireless Sensor Networks (WSN) is a critical issue due to the inherent limitations of computational capacity, storage capacity and power usage. Key management only makes sure the communicating nodes possess the necessary keys, at the same time protecting the confidentiality, integrity and authenticity of the communicated data. Approach: Proposed a RSA-CRT methodology for authenticated broadcast in the wireless sensor networks and analyzed the proposed with existing methodologies indicating their advantages, drawbacks and weaknesses. Results: The proposed RSA with CRT algorithm is improved the secured routing paradigm and provides efficient key management which using optimal encryption/decryption of broadcast messages authentication. Conclusion: The proposed system countermeasures the attacks in the network layer of WSN and it will reduce the communication overhead, storage space and energy consumption of nodes.

Journal of Computer Science
Volume 7 No. 6, 2011, 849-853

DOI: https://doi.org/10.3844/jcssp.2011.849.853

Submitted On: 14 March 2011 Published On: 14 June 2011

How to Cite: Palanisamy, K. & Chellappan, (2011). Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm. Journal of Computer Science, 7(6), 849-853. https://doi.org/10.3844/jcssp.2011.849.853

  • 2,860 Views
  • 3,063 Downloads
  • 2 Citations

Download

Keywords

  • Wireless Sensor Networks (WSN’s)
  • security issues
  • key management
  • Chinese Remainder Theorem (CRT)
  • authenticated broadcast
  • asymmetric keys algorithms
  • control domain
  • Public Key Encryption (PKE)
  • cluster keys
  • node keys