Loading

Public Key Encryption Algorithms for Wireless Sensor Networks in tinyOS
Chandni Vaghasia1, Kirti Bathwar2

1Chandni Vaghasia, Department of Computer Engineering, Charusat University, Changa (Gujarat), India.
2Kirti Bathwar, Department of Computer Engineering, Bhagawan Mahavir Engineering Collage, Surat (Gujarat), India.
Manuscript received on 12 March 2013 | Revised Manuscript received on 21 March 2013 | Manuscript Published on 30 March 2013 | PP: 28-34 | Volume-2 Issue-4, March 2013 | Retrieval Number: D0490032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Generally, when people consider wireless devices they think of items such as cell phones, personal digital assistants, or laptops. These items are costly, target specialized applications, and rely on the pre-deployment of extensive infrastructure support. In contrast, wireless sensor networks use small, low-cost embedded devices for a wide range of applications and do not rely on any pre-existing infrastructure. The emerging field of wireless sensor networks (WSN) combines sensing, computation, and communication into a single tiny device called sensor nodes or motes. Through advanced mesh networking protocols, these devices form a sea of connectivity that extends the reach of cyberspace out into the physical world. here some algorithms are implemented and result is analyzed on different platforms like PC MICA,Mica 2, Mica2dot and analyze which algorithm is best for which platform.
Keywords: Cryptography, Public Key Encryption, Sensor Nodes, Wireless Sensor Networks.

Scope of the Article: Underwater Sensor Networks