A modified Elliptic Curve Cryptography Technique for Secur-ing Wireless Sensor Networks
-
https://doi.org/10.14419/ijet.v7i1.8.22959 -
Abstract
Despite rapid growth in the WSNs, it involved in all the fields of science and engineering. So due to wide usage, it is more prone to security threats. It is imperative to sketch an effective key management scheme for WSNs and take in consideration the confined characteristics of sensors. In this paper, a modified version of security is provided to wireless networks with the help of elliptic curve cryptography (ECC). With this benefits, this scheme works on the principle of converting given plaintext to appropriate ASCII values based on the doubling operations provided in encryption that can reduce the computation complexity to a lot.
-
References
[1] Ahmed A. Alkadhmawee and Songfeng Lu, “Prolonging the Network Lifetime Based on LPA-Star Algorithm and Fuzzy Logic in Wireless Sensor Network,†World Congress on Intelligent Control and Automation (WCICA), IEEE, 2016
[2] Pawgasame, W., “A survey in adaptive hybrid wireless Sensor Network for military operationsâ€. IEEE, in Second Asian Conference Defence Technology (ACDT), pp. 78-83, 2016
[3] J. Zhang and V. Varadharajan, “Wireless sensor network key management survey and taxonomyâ€, Journal of Network and Computer Applications, vol. 33, pp. 63-75, 2010.
[4] Omer K. Jasim, Safia Abbas and El-Sayed M. Horbaty, “Evolution of an Emerging Symmetric Quantum Cryptographic Algorithmâ€, Journal of Information Security, Vol. 6, pp. 82-92, 2015
[5] Ayman T., Ayman K. and Ali C., "Authentication Schemes for Wireless Sensor Networks," in Mediterranean Electrotechnical Conference (MELECON), IEEE, pp. 367-372, 2014
[6] P.Kumara Swamy, Dr.C.V.Guru Rao, Dr.V.Janaki, "Functioning of secure key authentication scheme in" in International Journal of Pure and Applied Mathemat, Volume 118, Issue 14, Page No(s) 27 - 32, MAR. 2018, [ISSN(Print):1314-3395]
[7] Srinivas Aluvala, K. Raja Sekar,, Deepika Vodnala, "A Novel Technique for Node Authentication in Mobile Ad-hoc Networks" in Elsevier - Perspectives in Science, Volume 8, Issue 1, Page No(s) 680 - 682, SEP. 2016, [ISSN(Print):2213-0209], DOI:10.1016/j.pisc.2016.
[8] Benenson, Z., Gartner, F. and Kesdogan, D. “User Authentication in Sensor Networks†(Extended Abstract), Lecture Notes in Informatics Proceedings of Informatics 2004, Workshop on Sensor Networks, Ulm, Germany, September 2004.
[9] Benenson, Z., Gedicke, N. and Raivio, O. “Realizing Robust User Authentication in Sensor Networksâ€, in the Workshop on Real-World Wireless Sensor Networks, Sweden, June 2005
[10] Wong, K., Zheng, Y., Cao, J., Wang, S. “A dynamic user authentication scheme for wireless sensor networksâ€. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, IEEE Computer Society; 2006. p. 244–51.
[11] Banerjee, S. and Mukhopadhyay, D. “Symmetric Key Based Authentication Querying in Wireless Sensor Networksâ€, in Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks, Nice, France, May 30-31, 2006.
[12] Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U. and Yung, M. “Perfectly-secure key distribution for dynamic conferencesâ€, in Advances in Cryptology CRYPTO 92, LNCS 740, pp. 471486, 1993.
[13] Jiang, C., Li B. and Xu H. “An Efficient Scheme for User Authentication in Wireless Sensor Networks†21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 2007.
[14] Tseng, H. R., Jan, R. H. and Yang, W. “An Improved Dynamic User Authentication Scheme for Wireless Sensor Networksâ€, GLOBECOM 2007
[15] Das, M. L. “Two-factor user authentication in wireless sensor networksâ€. IEEE Transactions on Wireless Communications 2009; 8(3):1086–90.
[16] Khan, M. K., Alghathbar, K. “Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networksâ€. Sensors 2010; 10:2450–9.
[17] He, D., Gao, Y., Chan, S., Chen, C. and Bu, J. “An enhanced two-factor user authentication scheme in wireless sensor networksâ€. Ad Hoc & Sensor Wireless Networks 2010; 10(4).
[18] Omar Cheikhrouhou, AnisKoubâa, ManelBoujelben and Mohamed Abid, “A Lightweight User Authentication Scheme for Wireless Sensor Networksâ€, The ACS/IEEE Workshop: Future Trends on Ad-hoc and Sensor Networks (FTASN2010), Hammamet, Tunisia, May 16-19, 2010.
[19] B. Vijay Kumar, Srinivas Aluvala, K. Sangameshwar, "Energy Mapping Approach for QoS in MANETs" in International Journal of Computer Sciences and Engineering, Volume 5, Issue 10, Page No(s) 273 - 275, OCT. 2017, [ISSN(Print):2347-2693, ISSN(Online): 2347-2693]
[20] Y.Nagender, Y. Chanti, B. Vijay Kumar, D.Mahesh, "Protection Issues and Disputes in Wireless Sensor Networks" in International Journal on Computer Science and Engineering (IJCSE), Volume 9, Issue 12, Page No(s) 706 - 713, DEC. 2017, [ISSN (Print):2229-5631, ISSN (Online): 0975-3397]
-
Downloads
-
How to Cite
Chanti, Y., Naik, D. K. S., Mothe, R., Yamsani, N., & Balija, S. (2018). A modified Elliptic Curve Cryptography Technique for Secur-ing Wireless Sensor Networks. International Journal of Engineering & Technology, 7(1.8), 230-232. https://doi.org/10.14419/ijet.v7i1.8.22959Received date: 2018-12-02
Accepted date: 2018-12-02