An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 5
Abstract
Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the energy efficiency while guarantee the required communication. Hence these protocols take security as an optional. Security problems exist in such protocols that may be vulnerable to various attacks and cannot be applied to many fields. Several energyconserving security architectures have been proposed in wireless sensor networks where Key distribution and Key management mechanism are basic problem of them. RSA, DSA and Elliptic curve cryptography (ECC) are three most widely adopted cryptosystems. ECC is considered as the one which has the highest security quality in per bit key among current public key cryptosystems. Security is not the only attractive feature of Elliptic Curve Cryptography (ECC), it also computationally more efficient than the first generation public key systems like RSA and Diffie-Hellman. This paper is to understand the threats in WSNs and try to present a unique secure node authentication scheme with strong and efficient key management scheme.
Authors and Affiliations
Pratik Ranjan , Nachiketa Tarasia
AN ENHANCED PRIVACY RULE BASED MODEL FOR FILTERING UNPREFERRED MESSAGES
The online social networks (OSN) offers proficient message controls that are posted on their private space in order to avoid un-preferred content displayed to users. But, OSN provides a low supportive and flexibility to...
A NOVEL HISTOGRAM BASED ROBUST IMAGE REGISTRATION TECHNIQUE
In this paper, a method for Automatic Image Registration (AIR) through histogram is proposed. Automatic image registration is one of the crucial steps in the analysis of remotely sensed data. A new acquired image must be...
Fault Tolerance in Wireless Sensor Networks using Stiffed Delaunay Triangulation
In this chapter, we introduce fault tolerance in Wireless Sensor Networks. Firstly, we start with a short description of sensor networks, fault tolerance and its different techniques. Then we discuss the different phases...
Rules Reduction Using Decision Matrix
The rules are the prescribed standards on the basis of which decisions are made for specific purpose. The rule is a statement that establishes a principle or standard, and serves as a norm for guiding or mandating action...
Krill Herd Clustering Algorithm using DBSCAN Technique
The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used...