A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks

  • Seog Chung Seo
  • Hyung Chan Kim
  • R. S. Ramakrishna
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


In this paper, we describe the design and implementation of a new security protocol based on Elliptic Curve Cryptosystems (ECC) for securing Wireless Sensor Networks (WSNs). Some public-key-based protocols such as TinyPK and EccM 2.0 have already been proposed in response. However, they exhibit poor performance. Moreover, they are vulnerable to man-in-the-middle attacks. We propose a cluster-based Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA) for efficiency and security during the pairwise key setup and broadcast authentication phases, respectively. We have implemented our protocol on 8-bit, 7.3828-MHz MICAz mote. The experimental results indicate the feasibility of our protocol for WSNs.


Sensor Node Wireless Sensor Network Elliptic Curve Security Protocol Normal Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Comm. ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  2. 2.
    Perrig, A., et al.: SPINS: security protocols for sensor networks. Wireless Networking 8(5), 521–534 (2002)MATHCrossRefGoogle Scholar
  3. 3.
    Du, W., et al.: A pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. 10th ACM Conf. Comp. and Comm. Security, pp. 42–51 (2003)Google Scholar
  4. 4.
    Blass, E.O., Zitterbart, M.: Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks (2005)Google Scholar
  5. 5.
    Gaubatz, G., et al.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: Proc. of 3th IEEE Conf. on Pervasive Comp. and Comm., pp. 146–150 (2005)Google Scholar
  6. 6.
    Kumar, S., et al.: Embedded End-To-End Wireless Security with ECDH Key Exchange. In: Proc. of IEEE Conf. On Circuit and Systems (2003)Google Scholar
  7. 7.
    Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: Proc. of IEEE Conf. on Sensor and Ad Hoc Comm. and Networks (2004)Google Scholar
  8. 8.
    Watro, R., et al.: TinyPK: Securing Sensor Networks with Public Key Technology. In: Proc. of SASN 2004, pp. 59–64. ACM Press, New York (2004)CrossRefGoogle Scholar
  9. 9.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: Link Layer Security Architecture for Wireless Sensor Networks. In: Proc. of SenSys 2004, pp. 162–175 (2004)Google Scholar
  10. 10.
    TinyOS forum, Available at:
  11. 11.
    MICAz Hardware Description, Available at:
  12. 12.
    Wander, A.S., et al.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proc. of IEEE Conf. on Pervasive Comp. and Comm. (2005)Google Scholar
  13. 13.
    Hankerson, D., Hernandez, J.L.: Software Implementation of Elliptic Curve Cryptography over Binary Fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 1–24. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Okeya, K., et al.: Signed Binary Representation Revisited. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 123–139. Springer, Heidelberg (2004)Google Scholar
  15. 15.
    Certicom Research: SEC 2-Recommended Elliptic Curve Domain ParametersGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Seog Chung Seo
    • 1
  • Hyung Chan Kim
    • 1
  • R. S. Ramakrishna
    • 1
  1. 1.Department of Information and CommunicationsGwangju Institute of Science and Technology (GIST)GwangjuRep. of Korea

Personalised recommendations