Advertisement

ECC-Based Secure Group Communication in Energy-Efficient Unequal Clustered WSN (EEUC-ECC)

  • G. Raja VikramEmail author
  • Addepalli V. N. Krishna
  • K Shahu Chatrapati
Conference paper
  • 18 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1090)

Abstract

With an advent of the Internet of things (IoT), wireless sensor networks (WSNs) are gaining popularity in application areas like smart cities, body area sensor networks, industrial process control, and habitat and environment monitoring. Since these networks are exposed to various attacks like node compromise attack, DoS attacks, etc., the need for secured communication is evident. We present an updated survey on various secure group communication (SGC) schemes and evaluate their performance in terms of space and computational complexity. We also propose a novel technique for secure and scalable group communication that performs better compared with existing approaches.

Keywords

Wireless sensor network (WSN) Elliptic curve cryptography (ECC) Secure group communication (SGC) Unequal clustering WSN multicasting 

References

  1. 1.
    Abuzneid., A.S., T. Sobh, and M. Faezipour. 2015. An Enhanced Communication Protocol For Location Privacy In Wsn. International Journal of Distributed Sensor Networks 20, 297–317.Google Scholar
  2. 2.
    Chen., H., and W. Lou. 2015. On Protecting End-to-End Location Privacy Against Local Eavesdropper In Wireless Sensor Networks. Pervasive and Mobile Computing 16 (Part A), 36–50.Google Scholar
  3. 3.
    Raja Vikram, G., A.V.N. Krishna, and K. Shahu Chatrapati. 2014. Energy Aware Clustering-based Routing Schemes for Wireless Sensor Networks—A Survey. International Conference on Innovations in Computer Science & Engineering (ICICSE-2014) 405–409.Google Scholar
  4. 4.
    He. X., M. Niedermeier, and H. De Meer. Dynamic Key Management in Wireless Sensor Networks: A Survey. The Journal of Network and Computer Applications 36 (2), 611–622.Google Scholar
  5. 5.
    Naranjo., J., and L. Casado. 2007. An Updated View on Centralized Secure Group Communications. Logic Journal of the IGPL 36 (2), 611–622.Google Scholar
  6. 6.
    Klaoudatou., E., E. Konstantinou, G. Kambourakis, and S. Gritzalis. 2011. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs. IEEE Communications Surveys & Tutorials 13 (3), 429–442.Google Scholar
  7. 7.
    Sakarind., P., and N. Ansari. 2007. Security Services in Group Communications Over Wireless Infrastructure, Mobile Adhoc and Wireless Sensor Networks. Wireless Communications, IEEE Computer Society 8–20.Google Scholar
  8. 8.
    Xiao., Y., V. K. Rayi., B. Sun, X. Du, F. Hu, and M. Galloway. 2007. A Survey of Key Management Schemes in Wireless Sensor Networks. Computer Communications 30 (11–12), 2314–2341.Google Scholar
  9. 9.
    Cheikhrouhou, O. 2015. Secure Group Communication in Wireless Sensor Networks: A Survey. Journal of Network and Computer Applications 41, 426–433.Google Scholar
  10. 10.
    Venkatraman., K., J. Vijay Daniel, and G. Murugaboopathi. 2013. Various Attacks in Wireless Sensor Network: Survey. International Journal of Soft Computing and Engineering 3, 107–120.Google Scholar
  11. 11.
    Cheikhrouhou., O., A. Kouba, G. Dini, H. Alzaid, and M. Abid. 2012. LNT: A Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks. Procedia Computer Science 5, 198–207.Google Scholar
  12. 12.
    Cheikhrouhou., O., A. Koubaa, O. Gaddour, G. Dini, and M. Abid. 2010. RiSeG: A Logical Ring Based Secure Group Communication Protocol For Wireless Sensor Networks. The International Conference on Wireless and Ubiquitous Systems (ICWUS2010), Tunisia, 615–22.Google Scholar
  13. 13.
    Dini., G., and L.Lopriore. 2015. Key Propagation in Wireless Sensor Networks. Computers & Electrical Engineering 41, 426–33.Google Scholar
  14. 14.
    Bao, X., J. Liu, L. She, and S. Zhang. 2014. A Key Management Scheme Based on Grouping Within Cluster. In 11th World Congress on Intelligent Control and Automation 126–33.Google Scholar
  15. 15.
    Cheikhrouho., O., A. Koubaa, G. Dini, and M. Abid. 2011. RiSeG: A Ring Based Secure Group Communication Protocol for Resource-Constrained Wireless Sensor Networks. Personal and Ubiquitous Computing 356–363.Google Scholar
  16. 16.
    Raja Vikram, G., A.V.N. Krishna, and K. Shahu Chatrapati. 2017. Variable Initial Energy and Unequal Clustering (VEUC) Based Multicasting in WSN. IEEE WiSPNET 2017 International Conference 82–86.Google Scholar
  17. 17.
    Kalra., S., and S.K. Sood. 2011. Elliptic Curve Cryptography: Survey and Its Security Applications. In Proceedings of the International Conference on Advances in Computing and Artificial Intelligence (ACAI’11), USA, 102–106.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • G. Raja Vikram
    • 1
    Email author
  • Addepalli V. N. Krishna
    • 2
  • K Shahu Chatrapati
    • 3
  1. 1.Department of CSEVignan Institute of Technology & ScienceHyderabadIndia
  2. 2.Department of CSE, Faculty of EngineeringCHRIST(Deemed to be University)BangaloreIndia
  3. 3.Department of CSEJ.N.T.U.H College of Engineering - ManthaniKarimnagarIndia

Personalised recommendations