Securing WSN and MANET communication for military operation based on ECC algorithm

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The key aspect in military operations is keeping the communication stable and secure as possible. Connection downtime should be avoidance as it creates miscommunication between Military officers hence would impact on the targeted mission. The complexity of the terrains such as in the jungle area, contribute to a great challenge in maintaining the communication amongst military officer. Wireless Sensor Network (WSN) and Mobile Ad-Hoc Network (MANET) have been chosen to support on the communication platform between military officers for its capability in maintaining the stability of the connection lines. The confidential of the shared data amongst the military officers are also crucial which could be stolen and tampered by outsiders. The Elliptic Curve Cryptography (ECC) algorithm is selected for its ability to provide high security with small key size. This paper proposed a new framework in securing the WSN and MANET communication based on ECC algorithm for Military operations. The contribution of this research will not only towards military operations but not limited to Search and Rescue (SAR) operations as well.



  • Keywords

    Wireless Sensor Network; Mobile Ad-Hoc Network; Elliptic Curve Cryptography; Military; Search and Rescue.

  • References

      [1] P.N.E Nohuddin, M.R.M. Isa & M.A.M. Shukran. (2012). ‘Information Technology Knowledge Management in Malaysian Armed Forces’. Journal of Convergence Information Technology 7 vol. (6).

      [2] A.K.A. Ghani, M.N. Ismail, Z. Omar, & P.N.E. Nohuddin. (2016). ‘Establishing mesh network amongst infantry personnel during military operations: A preliminary study’. 2016 International Conference on Information and Communication Technology (ICICTM), IEEE 16th - 17th May 2016, Kuala Lumpur, Malaysia.

      [3] N.J. Wesenten, G. Belenky, & T.J. Balkin. (2005). ‘Cognitive Readiness in Network-Centric Operations’, Parameters, spring 2005, PP, 94-105.

      [4] F. Khan & K. Nakagawa. (2012). Performance Improvement in Cognitive Radio Sensor Networks. in the Institute of Electronics, Information and Communication Engineers (IEICE), 8.

      [5] D. Puthal, S. Nepal, R. Ranjan, & J. Chen. (2015). A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. In Web Information Systems Engineering–WISE 2015 (pp. 93-108). Springer International Publishing.

      [6] D. Puthal, S. Nepal, R. Ranjan, & J. Chen. (2016). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences.

      [7] D. Puthal & B. Sahoo. (2012). Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique.

      [8] D. Puthal & B. Sahoo. (2012). Effective Machine to Machine Communications in Smart Grid Networks. ARPN J. Syst. Softw. © 2009-2011 AJSS Journal, 2(1), 18-22.

      [9] M. A. Jan, P. Nanda, M. Usman & X. He. (2016). “PAWN: A Payload-based mutual Authentication scheme for Wireless Sensor Networks,” “accepted”, 2016.

      [10] F. Khan, S.A. Kamal & F. Arif. (2013). Fairness Improvement in long-chain Multi-hop Wireless Adhoc Networks. International Conference on Connected Vehicles & Expo (pp. 1-8). Las Vegas: IEEE Las Vegas, USA.

      [11] M. A. Jan, P. Nanda, X. He & R. P. Liu (2013). “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network”, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.

      [12] Q. Jabeen, F. Khan, S. Khan & M.A. Jan. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. in the Journal Applied, Environmental, and Biological Sciences (JAEBS), vol. 6(4S), pp. 82-92. Print ISSN: 2090-4274 Online ISSN: 2090-4215, TextRoad.

      [13] F. Khan, & K. Nakagawa (2013). Comparative Study of Spectrum Sensing Techniques in Cognitive Radio Networks. in IEEE World Congress on Communication and Information Technologies (p. 8). Tunisia: IEEE Tunisia.

      [14] F. Khan, & K. Nakagawa (2012). Performance Improvement in Cognitive Radio Sensor Networks. in the Institute of Electronics, Information and Communication Engineers (IEICE), 8.

      [15] M. Usman, M. A. Jan & X. He. (2016). “Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds,” Elsevier Information sciences, “accepted”, 2016.

      [16] M. A. Jan, P. Nanda, X. He, Z. Tan & R. P. Liu. (2104). “A robust authentication scheme for observing resources in the internet of things environment” in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.

      [17] M. A. Jan, P. Nanda & X. He (2013). “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,” in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.

      [18] Ananyachatterjee & ManjushaPandey. (2014). “Practical Applications of Wireless Sensor Network Based on Military, Environmental, Health and Home Applications: A Survey”; International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January2014, ISSN 2229-5518.

      [19] G. Simon, M. Maróti, Á. Lédeczi, G. Balogh, B. Kusy A. Nádas, G. Pap, J. Sallai & K. Frampton. (2004). “Sensor Network-Based Counters niper System”; SenSys'04 Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, USA, November 2004ISBN: 1- 58113-879-2

      [20] Ms. Sunita, J. Malik & SumanMor. (2012).” Comprehensive Study of Applications of Wireless Sensor Network”; International Journal of Advanced Research in Computer Science and Software Engineering;Volume 2, Issue 11, November 2012; ISSN: 2277 128X.

      [21] K. Romer & F. Mattern. (2004). “The Design Space of Wireless Sensor Networks”; IEEE Wireless Communications, Volume: 11, Issue: 6, pp. 54-61, December 2004, ISSN: 1536-1284.

      [22] M. Kassim, C.K.H.C.K. Yahaya & M.N. Ismail. (2010). ‘A prototype of web based temperature monitoring system’. Proceedings of the IEEE, International Conference on Information and Network Technology, June 22-24, 2010, Shanghai, China, pp: 266-270.

      [23] M. Kassim, C.K.H.C.K. Yahaya & M.N. Ismail. (2010). ‘A study on automated, speech and remote temperature monitoring for modeling web based temperature monitoring system’. Proceedings of the IEEE, International Conference on Information and Network Technology, June 22-24, 2010, Shanghai, China, pp: 229-233.

      [24] M. T. Ismail, M.N. Ismail, S. S. Sameon, Z. M. Zin & N. Mohd. (2016). ‘Wireless Sensor Network: Smart greenhouse prototype with smart design’, 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR), 2016, pp. 57-62.

      [25] M.N. Ismail. (2012). ‘Early fire detection: development of temperature sensor device in smart home monitoring system using mobile phone’. International Journal of Academic Research (IJAR), Part A; 4(5), 41 -49, 2012.

      [26] P. G. Shah, X. Huang & D. Sharma. (2010). "Analytical study of implementation issues of Elliptical Curve Cryptography for Wireless Sensor networks", 2010 IEEE 24th International Coiference on Advanced Iiformation Networking and Applications Workshops.

      [27] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam & E.Cayirci (2002). "Wireless sensor networks: a survey" Published by Elsevier Science B.V., 2002.

      [28] Computer Security Division Information Technology Laboratory Transitions (2011). “Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths” Computer Security Division Information Technology Laboratory: U.S. Department of Commerce, 2011.




Article ID: 19020
DOI: 10.14419/ijet.v7i4.19020

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.