SARDS: Secured Anonymous Routing with Digital Signature in Wireless Sensor Network

A Wireless Sensor Network has witnessed a massive research towards security as well as energy efficiency in past decades. However, there are few studies that have witnessed a cost effective secure routing technique with energy effectiveness till date. Objectives: Our objective is to use public key cryptography for ensuring energy-efficient routing technique in Wireless Sensor Network. Method/Analysis: The proposed paper presents a technique called as SARDS (Secured Anonymous Routing with Digital Signature) that performs verification of the routing information exchanged among the sensors in Wireless Sensor Network. SARDS uses elliptical curve cryptography as the backbone of security formulations and performs authentication of all the communicating nodes present in the network. Findings: The system also allows a dual layer of security by introducing a novel signature based scheme towards public key encryption policy. The outcome of the study shows SARDS to excel best in performance in comparison of existing security and energy efficient routing schemes. Application/Improvements: Proposed SARDS technique offers 1) A novel public key encryption, 2) A novel digital signature scheme, and 3) A novel privacy or anonymous scheme. The outcome of the proposed system is also found to be superior as compared to existing protocols e.g. SecLEACH, LEACH and PEGASIS.


Introduction
Wireless Sensor Network is essentially used in those areas where it is not feasible for human-oriented intervention e.g. nuclear plant monitoring, habitat monitoring, climate surveillance, forest fire detection etc. Usually, in such area the sensors are dropped from aircraft in low elevation whose prime purpose is to perform sensing of environmentalbased information e.g. smoke, temperature, heat, pressure, motion etc. These sensors collect information and forward it to the base station and this process is termed as data aggregation 1,2 . However, a sensor is characterized by minimal computational capability, low processing power, reduced buffer, etc 3 . However, the information extracted by the sensors are subjected to a process of data fusion, which uses voting system and certain statistical technique to reduce the redundancies and forward the unique data to the next cluster head and then finally to base station. Such processed information is highly valuable and serve as data of interest for some illegitimate member called as adversary. An adversary node may be present in advance in the area of monitoring or may be placed after the sensors are deployed in Wireless Sensor Network. A closer look into the theory and literatures have shown that there was a series of research towards energy efficiency problem as well as issues related to routing protocol in sensor network 4 . Although there are various forms of attacks in sensor network, majority of the attacks are related to authentication failures, energy depletion, routing problems etc, but few of them are found to provide an effective solution. The attacks related to jamming, denial of service, and corruption of message occurs at the physical layer 5 . The malicious replication and spoofing of routing data and sinkhole attack normally occurs in network layer. The origination of the Sybil attack only occurs when the identity of the network is compromised. The attacks related to flooding and synchronization normally occurs in transport layer 5 . As sensor network also uses remote access policies hence it is highly vulnerable towards privacy that can get compromised very easily. Owing to computational less compatibility, a sensor node couldn't be equipped with sophisticated cryptographic technique. An efficient cryptographic protocol must also ensure an efficient confidentiality, privacy, integrity, nonrepudiation and authentication. Hence, majority of the existing researchers have presented security system more on routing based scheme and less on node based schemes. The cryptographic schemes applicable on routing based schemes requires dynamic memory to store and use the key management protocol, while cryptographic schemes based on node-based schemes cannot hold security for a longer time. Hence, there is a need of a cost effective security system that can ensure a robust authentication scheme. It was also seen that public key cryptography is the best option when it comes to cost and light weighted encryption scheme; however, even the key generated from the technique is not secured as such key are required to be broadcasted to the destination node. Usage of elliptical curve cryptography has already played a significant role in providing secure encryption scheme. But till date the robustness and cost effectiveness of elliptical curve cryptography is still questionable in the area of Wireless Sensor Network. Therefore, the present study formulates a robust authentication system from one to other nodes. The study implements a cost effective public key encryption policy in order to maintain a better balance between energy efficiency and security robustness. The study presents novel public key cryptographic scheme along with novel signature scheme that aims to resolve the existing issues of security. Section 2 discusses about the prior literatures towards security techniques followed by discussion of problem identification in Section 3. Section 4 introduces about the proposed system followed by an elaborated discussion of research methodology in Section 5. Algorithm discussion is carried out in Section 6 while result discussion is carried out in Section 7. Section 8 makes summarization of the paper.

Related Work
This section discusses about the existing research work being carried out for secured communication in Wireless Sensor Network.
Most reference 6 has suggested a method to improve encryption key management in Wireless Sensor Network. The authors have also used hashing technique for minimizing the latency. The outcome was also found to be energy efficient if encryption was carried out using MD5. However, the authors have not compared its outcome with any existing solution. Reference 7 have presented a technique of encryption using chaotic map as well as genetic algorithm. The authors have used public key cryptography (e.g. elliptical curve) in order to authenticate the active sensors. The experimentation was carried out on real sensors to find the presented technique to be better than existing block ciphering algorithm. Interestingly, the authors have used image data and tested the efficiency of the technique using CPU cycles, amount of memory consumption and entropy.
Reference 8 survey on cryptography using optimization algorithms in WSNs. Reference 9 has presented their study towards safeguarding communication over heterogeneous sensor network. The study have also emphasized over energy consumption issue and finally presented a keyexchange mechanism. Study towards enhancement of speed in public by cryptography using message encoding is proposed by reference 10 . The authors have presented an enhanced homomorphic encryption scheme along with identity-based digital signature technique. The prime purpose of the technique was to find and eliminate the malicious codes in routing. The assessment of the theory was done with mica Z motes using both RSA and elliptical curve cryptography. The outcome of the study was computed used energy consumption, communication overhead and computational complexity. However, the study misses benchmarking with other secured routing protocols. Reference 11 have presented a key management scheme using cryptographic hash function and key management protocol leading to secured group key generation using case study of body area network. The outcome proved the presented protocol to possess an efficient forward secrecy and efficient mutual authentication among the nodes.
Similar study towards securing group key was also presented by reference 12 . The authors have presented a dynamic tunneling process for enhancing the group key management. The study also claims to possess minimal computational complexity. The study was compared with existing technique e.g. IPSec with respect to message quantity and security latency. Reference 13 have developed a unique security technique using public key cryptography.
Using elliptical curves, the presented technique was also integrated with latent generator point for better privacy protocol in Wireless Sensor Network. Reference 14 have presented a key-based clustering policy using elliptical curve cryptography. The study also uses digital signatures. The system is found to also possess minimal energy consumption. Reference 15 has also carried out the study in similar direction of secure and energy efficiency in Wireless Sensor Network. Study towards resisting wormhole attack was carried out by reference 16 . The authors have presented a secured routing technique that is responsible for identifying the compromised links and then it segregates it. The technique calls for using unit disk graph framework for evaluating the required condition for identifying routes that are free from encapsulation of tunnel. The outcome of the study was compared with existing technique to find efficient packet delivery ratio. Reference 17 have presented a study to leverage the privacy factor in the process of data aggregation in Wireless Sensor Network. The prime objective is to minimize the rate of collision over arbitrary slots of time as well as technique to compensate data.
The review of literature have also witnessed maximum amount of work towards security using graph theory. One of such significant work was carried out by reference 18 where the focus was laid on using symmetric encryption scheme that goes well with the particular characteristics of sensor network. The authors have used spanning treebased approach along with key management scheme. The outcome of the study was evaluated with respect to amount of message with respect to neighbor size. Studies towards usage of geographic-based routing protocol were carried out by reference 19 . Presented technique uses a unique localization procedure that assists the user for identifying the attackers and then the system performs necessary quarantined actions. The interesting part of the study is that the presented secure routing protocol can be applicable for both sensor network as well as adhoc network. The positional outcome of the study was evaluated with respect to root mean square error. With real-time experimentation being carried out over motes, the outcome of the study was found with less location error. Another unique set of study was presented by reference 20 . The presented technique mainly emphasized on the load-balancing technique and used security over the communication channel in Wireless Sensor Network. The technique was also tested for sinkhole and wormhole attack with 3000 sensors over simulation-based study. The outcome of the study was also checked for energy consumption of the sensors as well as amount of the messages being arrived. Work carried out by reference 21 has presented a robust privacy factor routing protocol. Although the study was focused on mesh network but it is equally applicable over the sensor network too. Reference 22 have presented a discussion towards security in sensor network that elaborates the significance of cognitive radio in sensor network and its security aspects. Another unique study was found to be presented by reference 23 by introducing a secure routing technique over underwater sensory. The study also intends to accomplish energy conservation. Therefore, it can be seen that there are various studies being carried out towards security in Wireless Sensor Network. All the studies have their own advantages and possible limitations too. The next section discusses about the problems being identified for the proposed study.

Problems with Frequently used Techniques
This section discusses about the problems being identified after reviewing the existing techniques of vulnerability mitigations Wireless Sensor Network. The study of security issues in Wireless Sensor Network is not new and is dated more than 10 decades ago. With the advancement of communication system, the adversary too upgrades themselves and hence a tradeoff between better security and communication performance in area of sensor network always exists. Before, discussing the problems being identified it is essential for us to understand what are the possible form of existing countermeasures and what are their potentials.

Frequently used Countermeasures
There are various studies in past where mapping protocol were developed in order to identify the transmission zone that are being jammed within the sensor network 24 . Such forms of countermeasures are well built for Denial-of-Service attacks in sensor network. Certain studies e.g. refrence 25 have also used statistical characteristics in the mitigation formulations in order to resist Sybil attack. Such techniques make use of radio resource controls, validation of localization, arbitrary key pre-distribution, etc. in order to identify and resist Sybil attack. We have also found studies 26 that perform validation of the routes being established owing to the flooding attack in Wireless Sensor Network. Such techniques are found to adopt probability theory as well as secret sharing. Studies towards adoption of arbitrary key pre-distribution are also there.
There are various studies carried out using optimization techniques neural network 27 , genetic algorithm 28 , Ant Colony Optimization 29 , particle swarm optimization 30 etc. All these studies were mainly meant for optimizing the encryption scheme however such optimization based mitigation techniques are quite expensive. However, it was quite expensive process in order to retain lesser size of the key and maximal encryption. There are various applications in Wireless Sensor Network that supports real-time streaming and transmission process. Unfortunately, such process leads to maximized usage of resources in order to perform computation that will be required by the optimization-based algorithms. Hence, such optimization-based algorithms are not recommended for real-time applications. There also exists various other techniques e.g. trust-based schemes 31 , reputation-based schemes 32 , game theory 33 , which calls for usage of stochastic-based theory, time-series, probability theory and decision-making principles. Some of them are likely to hold maximum level of security with certain assumptions that doesn't hold true in realtime environment. Moreover, such implementations are always in search of using non-cryptographic based solution to provide security. Although, it achieves its objective of security, but till date we didn't came across any such protocols that make a well balance between robust security, communication performance and energy efficiency in Wireless Sensor Network. Therefore, there is a serious need of a secure routing technique using lightweight encryption mechanism in order to overcome such diversified flaws and constraints.

Problem Identification
The problems being identified in the proposed system are as follows:

Ineffective about Cryptographic Usage
It is commonly believed that a cryptographic technique leads to use of various iterative levels of encryption and decryption. Although, such operations of cryptography is highly essential for security against an adversary but it also leads to excessive energy consumption owing to processing of data or message. This fact leads to more circuitry power usage leading to unwanted energy dissipation in data fusion stage itself. Hence, there is very less cryptographic technique which discusses about less energy consumption due to reduced processing.

Imbalance between Security and Energy Conservation
While working on secure and energy efficient technique it is essential to understand the point where the security is implemented be it a node-based security or routing based security. Majority of the existing studies towards security uses node-based security with less emphasis on routing-based security. However, routing-based security techniques allows authentication scheme in efficient way but posses significant transmission delay. Hence, without focusing on standard radio-based energy model, it is really challenging to ascertain about the effectiveness of security. In reality, majority of the studies discussed in prior Section 2 doesn't use standard radio-based communication model. Therefore, there is much of imbalance between existing security system and energy conservation.

Study Specific to Adversary
It is well known that various forms of adversaries e.g. sinkhole attack, Byzantium attack, node capture attack, blackhole attack, wormhole attack etc. in study of Wireless Sensor Network. Moreover the existing studies on security are much case specific to type of attacker. This will mean that the presented solution is only applicable for one form of attacks. Therefore, it is essential to formulate security system that can understand the forms of attacks and formulate the solution based on the patterns of attack. It was also seen that majority of the adversary node attempt to victimize a node with less residual energy by compromising its authentication system. Hence, fewer studies are witnessed to perform uniform authentication scheme based on public key cryptography.

Lack of Effective Benchmarking
Majority of the existing studies towards security in Wireless Sensor Network are not compared with hierarchical energy efficient routing protocol to prove its energy effectiveness. An effective benchmarking could 5 H. R. Roopashree and Anita Kanavalli be carried out by comparing the presented outcome with both security techniques and energy efficient routing schemes.
The problem statement of the proposed study can be stated as follows -"This is a computationally challenging task to use public key cryptography for ensuring energyefficient routing technique in Wireless Sensor Network. " The next section discusses about proposed system that aimed for overcoming above mentioned issues.

Proposed System
Our prior study has focused on discussing existing secure and energy efficient communication system in Wireless Sensor Network 34 . Most recently, we have also presented a technique that uses tree-based technique to secure communication in sensor network 35 . We have also introduced a technique that focuses on robust authentication 36 . Our previous studies are more focused on security and less on energy efficiency. Hence, it was felt that security could be more enhanced with cryptography. However, applying cryptography could also increase the computational complexity and may affect the energy conservation. Hence, we aimed to introduce such a routing technique that incorporates robust authentication technique. We name it as SARDS (Secured Anonymous Routing with Digital Signature). Figure 1 shows the schematic diagram of the SARDS which shows that proposed system has mainly three core module, i.e. 1) A novel lightweight encryption scheme using public key cryptography, 2) A novel digital signature scheme for securing the signing procedure of routing message, and 3) To ensure privacy or anonymity in the routing message. According to SARDS, a sensor node signs the message while performing routing using elliptical curve cryptography. We enhance the flexibility of it by incorporating a novel digital signature scheme as well as discrete anonymity scheme with elliptical curve cryptography. The proposed SARDS scheme uses the similar node-to-node authentication mechanism using the framework of our prior studies. The proposed scheme also introduces a new matrix that stores specific number of arbitrary chosen sensors. Such sensors perform dynamic alterations of the routing information. While performing this operation, SARDS ensure that private information of the communicating sensors never to be disclosed by any sensor whether it may be regular or malicious nodes itself. SARDS provides dual layer of security by using two different forms of mathematical formulations just to generate signature and to authenticate the signatures. The prime objective was to ensure that SARDS use static memory usage while performing security operation along with routing.
The prime contributions of the proposed study are as follows: • To develop a routing protocol that can maintain a well balance between security and energy effectiveness. • To develop a routing scheme that allows the message to be encrypted using public key cryptography, this is intended only for destination node. • To enhance elliptical curve cryptography for simplifying the internal complexity associated with generation and usage of private keys. • To implement a novel digital signature scheme that can be used for generation of signature and validation of it during the routing operation itself.

Research Methodology
The proposed study of SARDS uses analytical research methodology for accomplishing the objective of secure routing. Although the prime aim of the SARDS is to accomplish secure communication but the internal architecture of the proposed algorithm also ensures enough energy efficiency at a same time. The basic methodology adopted for designing SARDS is pictorially presented in Figure 2.
It shows a transmitter as well as receiver, which are essentially two cluster heads connected with each other for performing data aggregation. The transmitter generates a random number, formulate a secret control message along with ciphers and forward the cipher to the next receiving node. However, a receiver node in order to perform deciphering process will require a token or key. In such circumstances, it is quite possible for receiver node to be rogue node and hence it is required to be validated. SARDS performs this task be receiving a validation token from receiver based on which transmitter chooses either to establish routing or to reject any possibility of routing with receiver. This section will further elaborate the prime modules involved in the internal architecture of SARDS as follows:

A Novel Public Key Cryptography
The proposed concept of SARDS uses base of elliptical curve cryptography to use public key cryptography as well as to encode the message such that it reaches only to destination address. Basically, a sensor node starts its communication by broadcasting its beacons, which can be completely compromised by an adversary. An adversary can easily spoof the beacon and make a replica of it to victimize other sensors. Hence, a robust public key can assist in validating the entire communicating node in route discovery and confirmation process. Our technique of is based on finite fields and it utilizes the positional information of the point residing on elliptical curves. One of the best features of elliptical curve cryptography is robust security as well as smaller size of key as compared to frequently adopted RSA algorithm. However, it is also accompanies by issues of complex mathematical designing process that can further shoot computational complexity leading to maximizing the size of the ciphered message even more than encryption using Diffie Hellman and RSA. Hence, we perform some modification towards enhancing the security standards of elliptical curve cryptography. The primary concept of the novel public key cryptography is based on encoding format of the message which could have possible. We consider the message format of the beacon (Figure 3). The above message format shows the presence of simple fields categorized as MAC header, MAC payload and MAC footer. However, the payload is absent in acknowledgement message. Hence, after conversion of the message to binarized encoded format, each message will have unique and different numbers. However, there are possibilities that some of the elements inside binarized encoded message could be found to be repetitive. If such repetitive elements are not repaired that it could lead to discloser of the encoding scheme. Hence, we enhance elliptical curve cryptography to identify such repetitive codes and substitute it appropriate with discrete encrypted codes making it near to impossible for an adversary to decrypt it further. (Figure 4). Hence, the enhancement done over conventional elliptical curve cryptography are 1) Randomization of third point in elliptical curve, 2) Allows forwarding of unique beacons in every attempt of route discovery as well as for route acknowledgement, 3) Manipulating hashing operation in conventional elliptical curve cryptography with binarized message format to identify repetitive codes. It is further secured using novel digital signature scheme.

A Novel Digital Signature Scheme
SARDS uses public key cryptography scheme which is based on finite field cryptography over elliptical curves. However, elliptical curves are basically a type of cyclic subgroup in cryptography that leads to a problem of p k = q where p and q can be denoted as finite group elements. Hence, in order to find the value of k, we use discrete logarithm of it which becomes np hard problem to solve. Usage of various additive, multiplicative, squaring and inversing operation over elliptical curves gives rise to prime fields i.e. generation of private keys. Although the best part of it is to generate reduced numbers of key size but at the same it leads to generation of massive number of key, which may affect computational time. We found that there is no benchmarked technique to solve discrete logarithmic problem in cryptography. The novel digital signature scheme consist of mainly three steps, 1) System to generate secret key, 2) Development of Secret key, and 3) Validation of Signature. The system considers α and β to be prime number and secret key generator respectively of the type public. The system then compute the public secret key using k = β r .mod α. The system then chooses a secret key in arbitrary mode in order to sign the secret message msg. The next part of the implementation will be to develop signature as sig = enc (γ.r.hash (msg, γ)+l.mod. ( α-1)), where l is another random number. The next phase of the study is to perform validation of the secret signature where we use β sig = γk γ.hash(msg, γ) .mod α. In case of legitimate signature, the system validates it and allows the system to permit further communication. The variable enc could be any encryption algorithm, however, we use AES.

A Novel Anonymity Scheme
The proposed SARDS ensure that routing takes place in highly anonymous way where the accessibility of the original message is only for sender and recipient nodes. It doesn't even permit intermediate nodes to access the confidential message by maintaining complete anonymity. The prime intention of this module is to maintain complete privacy. We also consider memory in this regards that will reposit the secure key information (group nodes, certificates, preloaded keys etc). We assume a separate matrix that stores this information inspite of storing the same in nodes thereby saving memory consumption. This matrix is accessed by the nodes that are looking to perform data aggregation. However, we limit this operation for communication between member nodes and cluster heads. Hence, we choose to assume that secret keys (public type) that participate in encryption process will be required to be registered in that matrix. The schematic diagram of the proposed novel anonymity scheme can be seen in the sequence diagram in Figure 6.
The scheme consists of 4 actors e.g. transmitting nodes, matrix of elliptical curve, digital signature and recipient. The sender forwards the message along with the generation of random numbers. The matrix retains all the transactional information e.g. msg, secret keys and then performs encryption which is then forwarded to be signed with the novel digital signature scheme. After the message is received by intermediate nodes, the identity of the originator and destination node address is encoded. We use the primary module to encode the entire control message and distribute the secret keys. This results in subsequent forwarding of the message from one to other node without giving any access rights to any nodes other than the destination nodes. Hence, a perfectly robust and lightweight encryption mechanism is proposed in routing using SARDS.

SARDS Algorithm Implementation
The development of the proposed study is carried out using Matlab. The simulation study is carried out for varied number of sensor ranging from 50-500 on both grid and random topology in Wireless Sensor Network. The simulation area considered for SARDS is 1200 x 1500 m 2 . The study is also independent from the location of base station. Usually in the area of hierarchical concept of routing, base station normally resides in the center of the simulation area. We discard this concept as positioning base station in center may lead to traffic congestion and at the same time it becomes difficult to perform scheduling of data packets toward base station. Hence, we placed the base station as far as possible from the rest of cluster. This section discusses about the algorithms used for designing proposed SARDS.

Algorithm for Public Key Cryptography
This algorithm takes the input of the number of nodes (n), transmission area (T x ) of 10 m and a message msg of 2000 bytes. The algorithm initially performs computation of two essential points in the elliptical curve i.e. a and b.
It also finds the 2nd point of the elliptical curve q as the base. Eval Key i *Key j *P*AP 8. Extract Key priv = y 9. Binarize the msg 10. If (sim_pat exist among broadcasted msg) 12. Encode uniquely 13. Encrypt msg using Key * msg + q mod q 14. Decrypt msg using (step-8)*Key -1 +q mod q.

End
The source node A selects an arbitrary secret key key i that lies between 1 and q. Similar operation is also carried out the other sender node B. Finally, the matrix Mat selects an arbitrary point AP and instantly transmits to both the nodes A and B. Finally, the secret key is computed and then we binaries the msg. If there is a similar pattern sim_pat exists among the msg, than we perform discrete encoding to ensure that there is no similar type of encoded message during broadcast. Finally, we encrypt and decrypt the msg.

Algorithm for Digital Signature
This algorithm discusses the usage of encryption standards using asymmetric key. The algorithm considers α as a prime number (odd) that is always greater than 3. Consider that variable a, b and α are the part of original elliptical curve equation (y 3 = x 3 +ax+b mod α). We also consider a reference point acting in base to be F i.e. F = (x F , y F ). The sender must choose an arbitrary integer whose value must lie within 1 to Z-1 that will be considered as

7, Results and Discussion
The outcome of the proposed study was compared with the three conventional hierarchical energy efficient routing protocol in Wireless Sensor Network i.e. SecLEACH 37 , LEACH 38 , and PEGASIS 39 . The study outcomes are as follows:

Analysis of Energy Efficiency
The outcome of the study shows that proposed SARDS excels much better energy consumption as compared to the existing system (Figure 7). SecLEACH is the only protocol that offers security in comparison to LEACH and PEGASIS. A closer look into the energy curve shows that SecLEACH exhibits energy conservation trend in better than LEACH. However, owing to incorporation of encryption process, the node consumes more energy as compared to PEGASIS. Although, SARDS uses digital signature as well as elliptical curve cryptography, but its operation is restricted to memory allocation of 35 bits, which results in faster processing time and lower energy consumption. We maintain a separate matrix that holds the authenticated information and routing information that also releases the usual load of authentication and message exchange time. This process conserves around 0.27 Joules of energy in each route discovery rounds and conserves around 0.35 Joules of energy in route authentication. Hence, a significant energy is retained in the entire signature generation and verification rounds in simulation study. We also found that with increasing traffic load, SARDS have comparatively lower energy consumption even compared to existing security and energy-efficient routing techniques in sensor network.

Anaysis of End-to-End Delay
End-to-end delay is another performance parameter considered for assessing the proposed SARDS. Figure  8 shows that LEACH has considerably increasing delay owing to the position of base station and clustering mechanism. PEGASIS offers reduced delay in comparison to LEACH but misses out security policy within it. SecLEACH performs better than LEACH and PEGASIS; however, SecLEACH has additional overhead owing to direct usage of symmetric key management scheme. This issue is overcome in the SARDS by using combination of public key cryptography and digital signature. The entire authentication scheme takes place faster compared to existing schemes that significantly minimizes the end-toend delay.

Analysis of Packet Delivery Ratio
Not only this, an evaluation of the packet delivery ratio is conducted on SARDS to check the communication performance. The numerical outcomes are highlighted in Table 1 that shows that SARDS have enhanced packet delivery ratio as compared to existing routing protocol e.g. SecLEACH, LEACH, PEGASIS. We have increased 100-1000 nodes in sequence to understand if traffic load exerted by additional nodes can be catered up properly by nodes. The trends of packet delivery ratio are in decreasing order owing to drainage of energy.
Therefore, the cumulative outcomes shows that SARDS excels better than existing routing protocol both in viewpoint of security but also in communication performance.

Conclusion
This paper discusses about the public key encryption scheme that is mainly meant for dealing with the vulnerable authentication scenario in Wireless Sensor Network. The technique also introduces a technique called as SARDS that offers, 1) A novel public key encryption, 2) A novel digital signature scheme and 3) A novel privacy or anonymous scheme. The total processing time of the SARDS is found to be twice the speed of existing routing techniques discussed in this paper. From performancebased complexity, the system also performs computation of storage complexity by evaluating the length of the message. The interesting point is the proposed system uses a defined matrix to perform authentication based on the total nodes available in the simulation area. Therefore, the proposed system has both lesser processing time and lesser storage complexity. The outcome of the proposed system is also found to be superior as compared to existing protocols e.g. SecLEACH, LEACH and PEGASIS.