Enhanced RSACRT for Energy Efficient Authentication to Wireless Sensor Networks Security
P. Kalyani and C. Chellappan
DOI : 10.3844/ajassp.2012.1660.1667
American Journal of Applied Sciences
Volume 9, Issue 10
Problem statement: The Security in WSN has become a challenge because of its inherent limitations of resources imposed on the sensor nodes. Authentication and key management scheme allows WSNs to be used with confidence and maintains integrity of data in sensor networks. Approach: In the WSN limited resource scenario the generation of public key done and are randomly pre distributed while deploying the sensor nodes. Since the sensor nodes are limited by energy it needs to concentrate on fast decryption and verification of message. In order to enable the fast decryption we have proposed a novel method which uses three algorithms hybrid to achieve the increase in decryption speed which in turn reduces the energy used for computation and enhances its performance compared with the existing authentication using classical RSA algorithm. Results: The proposed Enhanced Variant of RSA with CRT using Garnerâ€™s algorithm to achieve fast decryption speed and provides better performance when compared to the existing RSA. The private key is generated and passed so that the receiver node need not generate it which consumes more computational cost, power and memory at the decryption stage. Also we have done the signing and verification which avoids the message spoofing attack and enable message confidentiality. Further the ERSACRT is designed to counter measure to few attacks possible on RSA. We implemented the ERSACRT in java and tested for system parameters like memory, time, speed and efficiency and compared with that of RSA. Conclusion/Recommendation: The proposed algorithm ERSACRT is efficient and secured along with improved counter measures for secured communication in WSN with reduced energy and computational time.
Cite this Article
Kalyani, P. and C. Chellappan, 2012. Enhanced RSACRT for energy efficient authentication to wireless sensor networks security. Am. J. Applied Sci., 9: 1660-1667.