CFP last date
22 April 2024
Reseach Article

Authentication Protocols for WSN using ECC and Hidden Generator

by Ayaz Hassan Moon, Ummer Iqbal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 13
Year of Publication: 2016
Authors: Ayaz Hassan Moon, Ummer Iqbal
10.5120/ijca2016908175

Ayaz Hassan Moon, Ummer Iqbal . Authentication Protocols for WSN using ECC and Hidden Generator. International Journal of Computer Applications. 133, 13 ( January 2016), 42-47. DOI=10.5120/ijca2016908175

@article{ 10.5120/ijca2016908175,
author = { Ayaz Hassan Moon, Ummer Iqbal },
title = { Authentication Protocols for WSN using ECC and Hidden Generator },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 13 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number13/23850-2016908175/ },
doi = { 10.5120/ijca2016908175 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:31:08.777227+05:30
%A Ayaz Hassan Moon
%A Ummer Iqbal
%T Authentication Protocols for WSN using ECC and Hidden Generator
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 13
%P 42-47
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is an important Security primitive in any class of network both at the entity level as well as at the message level. All the network entities comprising of WSN including nodes, cluster heads and base station need to be authenticated before sending or receiving any kind of communication within them. Public Key Cryptography offers broad based solutions to address all the security concerns. However such solutions are far too expensive to be applied directly to WSN owing to its resource constraints. ECC and its variant Tiny- ECC offers the scope and the potential to build light weight solutions for WSN based networks. In this paper, light weight authentication protocols for Base to Node, Node to Base and Node to Node have been presented. These protocols are based on Elliptical Curve Cryptography and Hidden Generator Concepts. Hash Chains which are computationally light have been also used. The protocols have been developed in TinyOS, the defacto operating system for WSN and simulated in Tossim .The protocols have been ported to WSN hardware targeting MicaZ mote. The paper also brings out performance parameters of the developed protocols.

References
  1. Mote Works, Getting Started Guide, March 2013 ,PN: 7430-0102-02
  2. Francisco Sanchez-Rosario et al. 2015 A Low Consumption Real Time Environmental Monitoring System for Smart Cities based on ZigBee Wireless Sensor Network IEEE,978-1-4799-5344-8, 2015.
  3. Adrian Perrig, John Stankovic, David Wagner June 2004 Security in wireless sensor networks Communications of the ACM, vol 47,no. 6, pp 53-57,.
  4. Crtien etal 2009 Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks IFIP International Federation for Information Processing
  5. Bernard Menzes “Network Security and Cryptography”, Cengage Learning
  6. Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and David E.Culler 2001 SPINS: Security protocol for sensor networks in proceedings of 7th International conference on mobile networking and computing, 2001, vol 8, no.5, pp 189-199,.
  7. Karlof, C., Sastry, N., Wagner, D. 2004 TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys, Baltimore, MD, USA, November 3-5, 2004, pp. 162–175. ACM
  8. S.,Setia,S., and Jajochia, S 2003 LEAP: Energy efficient security mechanism for large-scale distributed sensor networks In the proceedings of the conference on computer and communications security ,03,ACM Press, Washigton DC, pp 62-72.76.
  9. Ping Guo et al 2013 Authentication Mechanism on Wireless Sensor Networks: A Survey ITCS
  10. R. Watro, D. Kong, S.Cuti, C.Gardiner, C.Lynn and P. Kruus 2004 TinyPK: Securing sensor networks with public key technology. in the proceedings of 2nd ACM workshop on security of adhoc sensor networks (SASN 04), pp 59-64, New York, ACM press.
  11. D. Hankerson et al. 2004 Guide to Elliptic Curve Cryptography” Springer
  12. www.certicom.com
  13. TinyOS. http:// www.tinyos.net
  14. P. Levis, N. Lee, M. Welsh and D. E. Culler. et al 2003 TOSSIM : Accurate and Stable Simulation of Entire TinyOS Applications. SenSys
  15. A. Liu and P. Ning et al. 2008 Tiny ECC: A Configurable Library for Elliptical Curve Cryptography in Wireless Sensor Networks IPSN
  16. Moon A.H and Iqbal Ummer .2015 Light Weight Secure Key Generation Protocol with Hidden Generator Point using ECC in Transactions on Networks and Communications
  17. Moon A.H, Shah NA, Iqbal Ummer, Ayub Adil 2013 Simulating and Analyzing Security Attacks in WSN Using Qualnet, published in IEEE Conference on ICMIRA,pp. 68-76,2013
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Hidden Generator WSN ECC