A modified Elliptic Curve Cryptography Technique for Secur-ing Wireless Sensor Networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Despite rapid growth in the WSNs, it involved in all the fields of science and engineering. So due to wide usage, it is more prone to security threats.  It is imperative to sketch an effective key management scheme for WSNs and take in consideration the confined characteristics of sensors. In this paper, a modified version of security is provided to wireless networks with the help of elliptic curve cryptography (ECC). With this benefits, this scheme works on the principle of converting given plaintext to appropriate ASCII values based on the doubling operations provided in encryption that can reduce the computation complexity to a lot.


  • References


      [1] Ahmed A. Alkadhmawee and Songfeng Lu, “Prolonging the Network Lifetime Based on LPA-Star Algorithm and Fuzzy Logic in Wireless Sensor Network,” World Congress on Intelligent Control and Automation (WCICA), IEEE, 2016

      [2] Pawgasame, W., “A survey in adaptive hybrid wireless Sensor Network for military operations”. IEEE, in Second Asian Conference Defence Technology (ACDT), pp. 78-83, 2016

      [3] J. Zhang and V. Varadharajan, “Wireless sensor network key management survey and taxonomy”, Journal of Network and Computer Applications, vol. 33, pp. 63-75, 2010.

      [4] Omer K. Jasim, Safia Abbas and El-Sayed M. Horbaty, “Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm”, Journal of Information Security, Vol. 6, pp. 82-92, 2015

      [5] Ayman T., Ayman K. and Ali C., "Authentication Schemes for Wireless Sensor Networks," in Mediterranean Electrotechnical Conference (MELECON), IEEE, pp. 367-372, 2014

      [6] P.Kumara Swamy, Dr.C.V.Guru Rao, Dr.V.Janaki, "Functioning of secure key authentication scheme in" in International Journal of Pure and Applied Mathemat, Volume 118, Issue 14, Page No(s) 27 - 32, MAR. 2018, [ISSN(Print):1314-3395]

      [7] Srinivas Aluvala, K. Raja Sekar,, Deepika Vodnala, "A Novel Technique for Node Authentication in Mobile Ad-hoc Networks" in Elsevier - Perspectives in Science, Volume 8, Issue 1, Page No(s) 680 - 682, SEP. 2016, [ISSN(Print):2213-0209], DOI:10.1016/j.pisc.2016.

      [8] Benenson, Z., Gartner, F. and Kesdogan, D. “User Authentication in Sensor Networks” (Extended Abstract), Lecture Notes in Informatics Proceedings of Informatics 2004, Workshop on Sensor Networks, Ulm, Germany, September 2004.

      [9] Benenson, Z., Gedicke, N. and Raivio, O. “Realizing Robust User Authentication in Sensor Networks”, in the Workshop on Real-World Wireless Sensor Networks, Sweden, June 2005

      [10] Wong, K., Zheng, Y., Cao, J., Wang, S. “A dynamic user authentication scheme for wireless sensor networks”. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, IEEE Computer Society; 2006. p. 244–51.

      [11] Banerjee, S. and Mukhopadhyay, D. “Symmetric Key Based Authentication Querying in Wireless Sensor Networks”, in Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks, Nice, France, May 30-31, 2006.

      [12] Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U. and Yung, M. “Perfectly-secure key distribution for dynamic conferences”, in Advances in Cryptology CRYPTO 92, LNCS 740, pp. 471486, 1993.

      [13] Jiang, C., Li B. and Xu H. “An Efficient Scheme for User Authentication in Wireless Sensor Networks” 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 2007.

      [14] Tseng, H. R., Jan, R. H. and Yang, W. “An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks”, GLOBECOM 2007

      [15] Das, M. L. “Two-factor user authentication in wireless sensor networks”. IEEE Transactions on Wireless Communications 2009; 8(3):1086–90.

      [16] Khan, M. K., Alghathbar, K. “Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks”. Sensors 2010; 10:2450–9.

      [17] He, D., Gao, Y., Chan, S., Chen, C. and Bu, J. “An enhanced two-factor user authentication scheme in wireless sensor networks”. Ad Hoc & Sensor Wireless Networks 2010; 10(4).

      [18] Omar Cheikhrouhou, AnisKoubâa, ManelBoujelben and Mohamed Abid, “A Lightweight User Authentication Scheme for Wireless Sensor Networks”, The ACS/IEEE Workshop: Future Trends on Ad-hoc and Sensor Networks (FTASN2010), Hammamet, Tunisia, May 16-19, 2010.

      [19] B. Vijay Kumar, Srinivas Aluvala, K. Sangameshwar, "Energy Mapping Approach for QoS in MANETs" in International Journal of Computer Sciences and Engineering, Volume 5, Issue 10, Page No(s) 273 - 275, OCT. 2017, [ISSN(Print):2347-2693, ISSN(Online): 2347-2693]

      [20] Y.Nagender, Y. Chanti, B. Vijay Kumar, D.Mahesh, "Protection Issues and Disputes in Wireless Sensor Networks" in International Journal on Computer Science and Engineering (IJCSE), Volume 9, Issue 12, Page No(s) 706 - 713, DEC. 2017, [ISSN (Print):2229-5631, ISSN (Online): 0975-3397]


 

View

Download

Article ID: 22959
 
DOI: 10.14419/ijet.v7i1.8.22959




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.