An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks

Abstract

Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the energy efficiency while guarantee the required communication. Hence these protocols take security as an optional. Security problems exist in such protocols that may be vulnerable to various attacks and cannot be applied to many fields. Several energyconserving security architectures have been proposed in wireless sensor networks where Key distribution and Key management mechanism are basic problem of them. RSA, DSA and Elliptic curve cryptography (ECC) are three most widely adopted cryptosystems. ECC is considered as the one which has the highest security quality in per bit key among current public key cryptosystems. Security is not the only attractive feature of Elliptic Curve Cryptography (ECC), it also computationally more efficient than the first generation public key systems like RSA and Diffie-Hellman. This paper is to understand the threats in WSNs and try to present a unique secure node authentication scheme with strong and efficient key management scheme.

Authors and Affiliations

Pratik Ranjan , Nachiketa Tarasia

Keywords

Related Articles

AN ENHANCED PRIVACY RULE BASED MODEL FOR FILTERING UNPREFERRED MESSAGES

The online social networks (OSN) offers proficient message controls that are posted on their private space in order to avoid un-preferred content displayed to users. But, OSN provides a low supportive and flexibility to...

A NOVEL HISTOGRAM BASED ROBUST IMAGE REGISTRATION TECHNIQUE

In this paper, a method for Automatic Image Registration (AIR) through histogram is proposed. Automatic image registration is one of the crucial steps in the analysis of remotely sensed data. A new acquired image must be...

Fault Tolerance in Wireless Sensor Networks using Stiffed Delaunay Triangulation

In this chapter, we introduce fault tolerance in Wireless Sensor Networks. Firstly, we start with a short description of sensor networks, fault tolerance and its different techniques. Then we discuss the different phases...

Rules Reduction Using Decision Matrix

The rules are the prescribed standards on the basis of which decisions are made for specific purpose. The rule is a statement that establishes a principle or standard, and serves as a norm for guiding or mandating action...

Krill Herd Clustering Algorithm using DBSCAN Technique

The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used...

Download PDF file
  • EP ID EP141048
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Pratik Ranjan, Nachiketa Tarasia (2013). An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks. International Journal of Computer Science & Engineering Technology, 4(5), 561-566. https://europub.co.uk/articles/-A-141048