Securing Wireless Sensor Networks Using Elliptic Curve Cryptography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2018 by IJETT Journal
Volume-56 Number-1
Year of Publication : 2018
Authors : Najmus Saqib, Sayar Singh Shekhawat
DOI :  10.14445/22315381/IJETT-V56P202


Najmus Saqib, Sayar Singh Shekhawat "Securing Wireless Sensor Networks Using Elliptic Curve Cryptography", International Journal of Engineering Trends and Technology (IJETT), V56(1),7-11 January 2018. ISSN:2231-5381. published by seventh sense research group

Wireless Sensor Networks have been an active area of research owing to its myriad range of applications. Traditional security protocols are not feasible for such networks due to their resource constraint nature. However, ECC has been considered as a viable cryptographic technique due to its low computational this paper study and application of ECC on a popular wsn operating system, TinyOS has been carried out. Practical implementation of the ECC operations have been performed using TinyECC library. TinyECC has been used to develop custom security protocols on TinyOS. Performance benchmarking of the proposed protocols has also been carried out. The developed protocol has been fused on the Micaz Motes

[1] Moon A.H, Shah NA, Iqbal Ummer, Ayub Adil 2013 Simulating and Analyzing Security Attacks in WSN Using Qualnet, IEEE Conference on ICMIRA, pp. 68-76,2013
[2] Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and David E. Culler 2001 SPINS: Security protocol for sensor networks in proceedings of 7th International conference on mobile networking and computing, 2001, vol 8, no.5, pp 189-199.
[3] Karlof, C., Sastry. Wagner,D. 2004 . TinySec: Link Layer Security Architecture for Wireless Sensor Networks,” Sensys., Baltimore, MD.
[4] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus 2004 TinyPK: Securing sensor networks with public key technology. in the proceedings of 2nd ACM workshop on security of adhoc sensor networks (SASN 04), pp 59-64, New York, ACM press.
[5] N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz. 2004.Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES2004.
[6] Malan, D.J., Welsh. Smith,D.M,2008, Implementing Public Key Infrastructure for Sensor Networks,” Transactions on Sensor Networks, vol.4
[7] Malan, D.J., Welsh. Smith, 2004 A Public Key Infrastructure for Key Distribution in TinyOS based on Elliptic Curve Cryptography. First Annual IEEE Communications Society Conference on Sensor and Adhoc Communications and Networks, pp. 71-80.
[8] D.Hankerson et al. 2004. Guide to Elliptic Curve Cryptography. Springer;
[9] Bernard Menzes. Network Security and Cryptography. Cengage Learning
[10] Lampard L.1981. password. Authentication with in Secure Communication. COMM ACM ;1981; 24:770-772
[11] Levis, P., and Gay.D., 2009 TinyOS Programming. Cambridge University Press.
[12] P. Levis, N. Lee, M. Welsh and D. E. Culler. et al .2003. TOSSIM: “Accurate and Stable Simulation of Entire TinyOS Applications. SenSys
[13] A. Liu and P. Ning et al.2008. Tiny ECC: A Configurable Library for Elliptical Curve Cryptography in Wireless Sensor Networks,” in proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track
[14] Moon A.H and Iqbal Ummer .2015 .Light Weight Secure Key Generation protocol with Hidden Generator point using ECC”Transactions in Network and Communication, Society for Science and Education, United Kingdom

WSN; TinySec; ECC; TinyOS, Hash Chains