Skip to main content

Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks

  • Conference paper
Book cover Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile environments. Basically sensor networks are application dependent. Wireless sensor network (WSN) applications can be classified into two - event based and continuous monitoring. This paper focuses on continuous monitoring application. One of the major challenges of wireless sensor network is security. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above mentioned challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy consumed by a node, so there is a need to reduce the energy thus the cost incurred by security algorithm.In this paper the performance of the RSA cryptography algorithm is compared with the ELGAMAL cryptography algorithm by evaluating their energy efficiency and network lifetime. A cluster based wireless network topology environment is constructed in NS2 and the performances of different cluster are compared. From the simulated output the RSA algorithm consumes less energy than ELGAMAL algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wander, A.S., Gurat, N.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proceeding of the 3rd IEEE International Conference on Pervasive Computing and Communications. University of California, Berkeley (2005)

    Google Scholar 

  2. Whitfield, D., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory 22 (1976)

    Google Scholar 

  3. Delgosha, F.: Senier member of IEEE, A multivibrate key establishment scheme for wireless sensor networks. IEEE Transaction on Wireless Communication 18 (April 2009)

    Google Scholar 

  4. Gaubatz, G., Jens, E.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: Proceeding of the 3rd IEEE International Conference on Pervasive Computing and Communications. Worcester Polytechnic Institute, USA (2005)

    Google Scholar 

  5. Tong-sen, H., Deng, C., Xian-zhong, T.: College of information Engineering, An Enhanced Polynomial-based Key Establishment Scheme for Wireless Sensor Networks. In: 2008 International Workshop on Education Technology and Training (2008)

    Google Scholar 

  6. Ma, L., Liu, F., cheng, X.: iPAK: An in situ pair wise key bootstrapping scheme for wireless networks. IEEE Transaction on Parallel and Distributed Systems 18(8) (August 2007)

    Google Scholar 

  7. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceeding of the 10th ACM, Conference on Computer and Communications Security (2003)

    Google Scholar 

  8. Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security 4(1&2) (2009)

    Google Scholar 

  9. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (February 1978)

    Google Scholar 

  10. Du, X., Xiao, Y.: A routing driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Transaction on Wireless Communications 8(3) (March 2009)

    Google Scholar 

  11. Luo, X., Zheng, K.: Encryption algorithms comparisons for wireless networked sensors. In: 2004 IEEE International Conference on Systems, Man and Cybernetics, College of Computer Science. Zhejiang University, China (2004)

    Google Scholar 

  12. Zhang, Z., Cui, G.: A Cluster Based Secure Cryptography for Sensor Networks. In: 2008 International Conference on Computer Science and Software Engineering. Huazhong University of Science & Technology, China (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kayalvizhi, R., Vijayalakshmi, M., Vaidehi, V. (2010). Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics