A Security Enhancing Scheme in Leach using Homomorphic Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

A Security Enhancing Scheme in Leach using Homomorphic Encryption

Neha Chhabra, Parikshit Singla

As WSNs grow in application area and are used more frequently, the need for security in them becomes inevitable and vital. However, the inherent characteristics of WSNs incur constraints of sensor nodes, such as limited energy, processing capability, and storage capacity, etc. These constraints make WSNs very different from traditional wireless networks. Consequently, many innovative security protocols and techniques have been developed to meet this challenge. In this paper, we outline security and privacy issues in sensor networks, address the state of the art in sensor network security and energy consumption of different scheme; specially application of public key cryptography also known as homomorphic encryption. Till now it is a known fact that asymmetric key cryptography is not suitable for WSN. But with the introduction of new energy efficient sensor nodes such as TelosB etc. researchers are exploring and evaluating the effect of public key cryptography on WSN.

Keywords: As WSNs grow in application area and are used more frequently, the need for security in them becomes inevitable and vital However, the inherent characteristics of WSNs incur constraints of sensor nodes, such as limited energy, processing capability, and storage capacity, etc These constraints make WSNs very different from traditional wireless networks Consequently, many innovative security protocols and techniques have been developed to meet this challenge In this paper, we outline security and privacy issues in sensor networks, address the state of the art in sensor network security and energy consumption of different scheme, specially application of public key cryptography also known as homomorphic encryption Till now it is a known fact that asymmetric key cryptography is not suitable for WSN But with the introduction of new energy efficient sensor nodes such as TelosB etc researchers are exploring and evaluating the effect of public key cryptography on WSN

Edition: Volume 2 Issue 7, July 2013

Pages: 105 - 108

Share this Article

How to Cite this Article?

Neha Chhabra, Parikshit Singla, "A Security Enhancing Scheme in Leach using Homomorphic Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2011262, Volume 2 Issue 7, July 2013, 105 - 108

88 PDF Views | 72 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'limited energy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2727 - 2729

Improving WSN Lifetime Using Q-Routing Technique

Alphy Joseph, Shameela Sulaiman

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1519 - 1524

Location Aided Optimized SPIN in Wireless Sensor Network

Anu Tanwar, Amit Rathee, Anjali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2648 - 2653

A Survey Framework on Energy Efficient and Secure Routing Protocol in WSN

Penumolu. Ratnakumari, M. Koteswara Rao

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1536 - 1542

Survey on Energy Efficient Routing Protocol in Wireless Sensor Network

Poonam Kudale, M. D. Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1360 - 1364

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour, Lal Chand Panwar

Share this Article

Similar Articles with Keyword 'processing capability'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1646 - 1650

Performance Analysis of Multi-Node Hadoop Clusters using Amazon EC2 Instances

Ruchi Mittal, Ruhi Bagga

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1219 - 1223

Lightning CEP - High Performance & Low Latency Complex Event Processor

Vikas Kale, Kishor Shedge

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1548 - 1552

Energy Efficient Hierarchical Protocols in Wireless Sensor Networks

Vaishali P Bawage, Deepak C Mehetre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 105 - 108

A Security Enhancing Scheme in Leach using Homomorphic Encryption

Neha Chhabra, Parikshit Singla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1718 - 1720

Survey Paper on Data Lake

Surabhi D Hegde, Ravinarayana B

Share this Article

Similar Articles with Keyword 'storage capacity'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1782 - 1787

Review Paper on Online Shortest Path Computation

Pratik P.Watane, Prof. Prachi V. Kale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1638 - 1644

Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud using Privacy Leakage Upper Bound Constraint-Based Approach

Ravindra Suresh Kamble, Sheikh Gouse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 842 - 846

An Efficient Technique of Steganography

Latika, Yogita Gulati

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article
Top