A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)

Abstract

Today the wireless sensor networks are being used extensively for general purposes and military aviation that results into the fulfillment of the security requirements. These networks are easily susceptible to attack. Many researchers provided security by using symmetric key cryptography but advanced research shows public key cryptography algorithms can also be used in WSN. Major studies and researches in literature nowadays stress on RSA and ECC algorithms but RSA consumes more energy than ECC. We propose a protocol to provide secure data delivery between node and gateway. Our protocol is based on ECDSA and the proposed scheme imposes very light computational and communication overhead with reducing the measure of key storage. Analysis depicts that the scheme has few merits in connectivity of key, consumption of energy and communication.

Keywords

Wireless sensor networks Network security Key management 

References

  1. 1.
    Su, J.M., Huang, C.F.: An easy-to-use 3D visualization system for planning context-aware applications in smart buildings. Int. J. Comput. Stand. Interfaces 32(2), 312–326 (2014)CrossRefGoogle Scholar
  2. 2.
    Rehman, A.U., Abbasi, A.Z., Islam, N., Shaikh, Z.A.: A review of wireless sensors and networks’ applications in agriculture. Comput. Stand. Interfaces 36(2), 263–270 (2014)CrossRefGoogle Scholar
  3. 3.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 38(4), 393–422 (2002)Google Scholar
  4. 4.
    Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad Hoc Netw. 3(3), 325–349 (2005)CrossRefGoogle Scholar
  5. 5.
    Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials, pp 223–237. 2nd Quarter (2006)Google Scholar
  6. 6.
    Eldefrawy, M.H., Khan, M.K., Alghathbar, K.: A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography. In: IEEE International Conference on Anti-Counterfeiting Security and Identification in Communication, pp. 1–6. IEEE (2010)Google Scholar
  7. 7.
    Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59, 801–807 (2013)CrossRefGoogle Scholar
  8. 8.
    Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy Analysis of public-key cryptography for wireless sensor networks. In: PerCom’05: Proceedings of the 3rd IEEE International Conference Pervasive Computing and Communication, March (2005)Google Scholar
  9. 9.
    Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and sensor Networks (SASN 04), pp. 59–64. ACM Press (2004)Google Scholar
  10. 10.
    Liu, A., Ning, P.: Tiny ECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: IEEE International Conference on Information Processing in Sensor Networks, April 2008, pp. 245–256 (2008)Google Scholar
  11. 11.
    Casola, V., Benedictis, A.D., Drago, A., Mazzocca, N.: Analysis and comparison of security protocols in wireless sensor networks. In: 30th IEEE Symposium on Reliable Distributed Systems Workshops (2011)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Gautam Buddha UniversityGreater NoidaIndia
  2. 2.Jawaharlal Nehru UniversityDelhiIndia

Personalised recommendations