An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks

Abstract

Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the energy efficiency while guarantee the required communication. Hence these protocols take security as an optional. Security problems exist in such protocols that may be vulnerable to various attacks and cannot be applied to many fields. Several energyconserving security architectures have been proposed in wireless sensor networks where Key distribution and Key management mechanism are basic problem of them. RSA, DSA and Elliptic curve cryptography (ECC) are three most widely adopted cryptosystems. ECC is considered as the one which has the highest security quality in per bit key among current public key cryptosystems. Security is not the only attractive feature of Elliptic Curve Cryptography (ECC), it also computationally more efficient than the first generation public key systems like RSA and Diffie-Hellman. This paper is to understand the threats in WSNs and try to present a unique secure node authentication scheme with strong and efficient key management scheme.

Authors and Affiliations

Pratik Ranjan , Nachiketa Tarasia

Keywords

Related Articles

A STUDY ON PROTOCOLS IN WIRELESS MESH NETWORK 

Wireless Mesh Networks (WMN) are the networks in which each node can communicate directly with more than one peer nodes. Wireless mesh networks can self form and self heal. In this paper we discuss about the some protoco...

Performance Analysis of Optical Wireless Communication Channel Link at Various Bit Rates

Optical wireless communication systems have got more popularity in last few years due to its advantage over conventional radio frequency communication systems. This paper reports the effect of using NRZ and RZ modulation...

A Comparative Study on Different Types of Sorting Algorithms (On the Basis of C and Java)

Sorting is used for arranging the data in some sequence like increasing or decreasing order. I have discussed about various sorting algorithm with their comparison to each other in basis of time complexity and space comp...

Krill Herd Clustering Algorithm using DBSCAN Technique

The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used...

A GIS based Analysis for Rooftop Rain Water Harvesting

For properly Digitizing the Roof area of any building, some parameters need to be determined in order to get maximum benefit. Google Earth is used to determine the view or the area with proper resolution. The resolution...

Download PDF file
  • EP ID EP141048
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Pratik Ranjan, Nachiketa Tarasia (2013). An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks. International Journal of Computer Science & Engineering Technology, 4(5), 561-566. https://europub.co.uk/articles/-A-141048