An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks

Abstract

Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the energy efficiency while guarantee the required communication. Hence these protocols take security as an optional. Security problems exist in such protocols that may be vulnerable to various attacks and cannot be applied to many fields. Several energyconserving security architectures have been proposed in wireless sensor networks where Key distribution and Key management mechanism are basic problem of them. RSA, DSA and Elliptic curve cryptography (ECC) are three most widely adopted cryptosystems. ECC is considered as the one which has the highest security quality in per bit key among current public key cryptosystems. Security is not the only attractive feature of Elliptic Curve Cryptography (ECC), it also computationally more efficient than the first generation public key systems like RSA and Diffie-Hellman. This paper is to understand the threats in WSNs and try to present a unique secure node authentication scheme with strong and efficient key management scheme.

Authors and Affiliations

Pratik Ranjan , Nachiketa Tarasia

Keywords

Related Articles

Advantages of Blackman Window over Hamming Window Method for designing FIR Filter

In signal processing, there are mainly two types of filters exist and the are Finite Impulse Response(FIR) filter and Infinite Impulse Response(IIR) filter. Finite Impulse Response(FIR) filter can be designed form Infini...

Segmentation of Brain Tumour and Its Area Calculation in Brain MR Images using K-Mean Clustering and Fuzzy C-Mean Algorithm

This paper deals with the implementation of Simple Algorithm for detection of range and shape of tumour in brain MR images. Tumour is an uncontrolled growth of tissues in any part of the body. Tumours are of different ty...

A Comparative Review on Hierarchical based and Distance Based Leach Protocol

Wireless Networking is a tools in which numeral mobile nodes can converse with each other openly or not directly through wireless relations. A sensor network is poised of a great number of sensor nodes and a sink. In the...

Intrusion Detection System with Data Stream Modeling using Conditional Privileges

IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable...

Analysis of Degenerated Tissue in Temporal Lobe of Human Brain using image segmentation Techniques

Degenerated Tissue in temporal lobe may cause diminished speech and memory difficulty. The principal of our Research work is automatic detection of degenerated tissues due to any disease in the temporal lobe. Fully autom...

Download PDF file
  • EP ID EP141048
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Pratik Ranjan, Nachiketa Tarasia (2013). An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks. International Journal of Computer Science & Engineering Technology, 4(5), 561-566. https://europub.co.uk/articles/-A-141048