A Lightweight Cryptosystem for Wireless Sensor Networks using ECC

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2020 by IJETT Journal
Volume-68 Issue-4
Year of Publication : 2020
Authors : Anisha Mahato, Dr. M. Pushpalatha
DOI :  10.14445/22315381/IJETT-V68I4P202S


MLA Style: Anisha Mahato, Dr. M. Pushpalatha  "A Lightweight Cryptosystem for Wireless Sensor Networks using ECC" International Journal of Engineering Trends and Technology 68.4(2020):7-12.

APA Style:Anisha Mahato, Dr. M. Pushpalatha. A Lightweight Cryptosystem for Wireless Sensor Networks using ECC  International Journal of Engineering Trends and Technology, 68(4),7-12.

Wireless sensor networks consists of tiny devices known as sensor nodes. These sensors monitor the physical conditions of the environment and the information gathered is processed to get relevant outcomes. The data can be collected, compressed and performed required functionalities in it. Security of the sensed information in this wireless connection is the major concern. Security is required in any field where there is exchange of information especially sensitive data like personal details, transactions etc. This can be overcomed with the help of robust cryptographic algorithms. Identification of a suitable cryptographic algorithm is a major challenge due to the resource constraints in computational capability and storage resources WSN.

In this paper the various lightweight cryptographic algorithms are discussed which are applied in the sensor nodes. Among the well known asymmetric cryptographic algorithms Elliptic Curve Cryptography (ECC) has the smallest key size for the same level of security. Field inversions used in ECC is a costly process. This can be reduced by the introduction of Montgomery Multiplication and projective coordinate system in the algorithm.


[1] Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Alavalapti Goutham Reddy, Athanasios V. Vasilakos, and Joel J. P. C. Rodrigues (2017)."The Design of Secure User Authenticated Key Management Scheme for Multi-Gateway Based Wireless Sensor Networks using ECC". Journal of Communication Systems (Wiley), Vol. 31, No. 8, pp. 1-31, 2018. (2017 SCI Impact Factor: 1.717)
[2] D. He, Y. Gao, S. Chan, C. Chen, and J. Bu (2010). "An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks." Ad Hoc & Sensor Wireless Networks, 10(4):361{371,2010}
[3] Anitha S.Sastry, Shazia Sulthana and Dr.S Vagdevi, “Security Threats in Wireless Sensor Networks in Each Layer”, International Journal of Advanced Networking and Applications, Vol. 04 Issue 04, pp. 1657-1661, 2013.
[4] Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu, and Adrijit Goswami (2017). " A Secure Smartcard-based Anonymous User Authentication Scheme for Healthcare Applications using Wireless Medical Sensor Networks,” Wireless Personal Communications (Springer), Vol. 94, No. 3, pp. 1899-1933, 2017. (2017 SCI Impact Factor: 1.200)
[5] N. Khalil, M. R. Abid, D. Benhaddou, and M. Gerndt (2014) , "Wireless sensors networks for Internet of Things".IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pages 1{6, Singapore, 2014.
[6] Minaie, A. Sanati-Mehrizy, P. Sanati-Mehrizy, and R. Sanati-Mehrizy(2013). "Application of Wireless Sensor Networks in Health Care System".American Society for Engineering Education, volume 3, pages 21{24, Atlanta, Georgia, 2013.}
[7] Woo Kwon Koo, Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee (2008). "Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks".International Conference on Information Security and Assurance
[8] W. Stallings.(2004)" Cryptography and Network Security: Principles and Practices." Pearson Education, India, 3rd edition.
[9] S. Zhu, S. Setia, and S. Jajodia.(2006) “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks." ACM Transactions on Sensor Networks
[10] B. Lai, S. Kim, and I. Verbauwhede.(2002)" Scalable session key construction protocol for wireless sensor networks."IEEE Workshop on Large Scale RealTime and Embedded Systems(LARTES), pages 1{6, Austin, Texas, 2002.
[11] Xu Huang, Pritam Shah, and Dharmendra (2010), SharmaFast Algorithm in ECC for Wireless Sensor Netwok”,Proceedings of the International Multi-Conference of Engineers and Computer Scientists, Vol II, IMECS 2010
[12] Anil Kumar Sutrala (2018),” Design and Analysis of Three-Factor User Authentication Schemes for Wireless Sensor Networks”, International Institute of Information Technology, Hyderabad
[13] Pyrgelis Apostolos,”Cryptography and Security in Wireless Sensor Networks”, FRONTS 2nd Winterschool Braunschweig, Germany
[14] Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz, “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs”, Sun Microsystems Laboratories [15] Guide to Elliptic Curve Cryptography, D Hankerson, AJ Menezes, S Vanstone, (Springer Professional Computing)

Elliptic Curve Cryptography(ECC), Elliptic Curve Discrete Logarithmic Problem (ECDLP), Montgomery multiplication, Wireless Sensor Networks(WSN)