CFP last date
22 April 2024
Reseach Article

Design and Develop ECC for Wireless Sensor Network

by Bhisham Sharma, Yogesh kumar, Vandana Ladha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 16
Year of Publication: 2012
Authors: Bhisham Sharma, Yogesh kumar, Vandana Ladha
10.5120/4901-7391

Bhisham Sharma, Yogesh kumar, Vandana Ladha . Design and Develop ECC for Wireless Sensor Network. International Journal of Computer Applications. 39, 16 ( February 2012), 1-7. DOI=10.5120/4901-7391

@article{ 10.5120/4901-7391,
author = { Bhisham Sharma, Yogesh kumar, Vandana Ladha },
title = { Design and Develop ECC for Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 16 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number16/4901-7391/ },
doi = { 10.5120/4901-7391 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:34.719381+05:30
%A Bhisham Sharma
%A Yogesh kumar
%A Vandana Ladha
%T Design and Develop ECC for Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 16
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks consist of sensor nodes and few powerful control mobile laptops performing activities like routing, data aggregation etc over wireless media. These kinds of networks are getting popular these days because of small size, ease of handle and installation. Because of this property they are used in environment like military, hospitals, weather forecasting etc. for processing critical information. However such kind of environment is more prone to “Man In the Middle Attack", where attacker can easily perform malicious activities without interrupting network operation, which can further propagate to other nodes that can alter say routing information and even can degrade the network performance and stability. In this paper we have designed ECC algorithm and implemented it over a simulated network created with the help of Java Sun Spot kit, consisting of two sensor devices and a base station. Here by going through the work done by different researchers where they have compared both RSA and ECC algorithm with the help of automated tool over different factors, it can be concluded that ECC is the most optimal and efficient algorithm for wireless communication. Using Java SunSpot kit a wireless sensor network is formulated and devices are made to communicate with Elliptical Diff-Hellman Algorithm implemented over it, the packet are then captured and verified using the automated tool.

References
  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E.Cayirci"Wireless sensor networks: a survey" Published by Elsevier Science B.V., 2002.
  2. Al-Sakib Khan Patan, Choong Seon Hoong, Hyung-Woo Lee, "Smartening the Enviornment using Wireless Sensor Networks in Developing Country", CACT,2006.
  3. F.Amin, A.H. Jahangir and H.Rasifard "Analysis of Public Key Cryptography", World Academy of Science Engineering and Technology, 2008.
  4. Sun Labs, “SunSpot Owner’s Manual", copyright Sun Microsystems
  5. Sun Labs, http://www.sunspotworld.com/GettingStarted /Linux.html", copyright Sun Microsystems.
  6. F.L. Lewis, Associate Director of Research and Head, Advanced Control and Sensor MEMS Group "Wireless Sensor Networks", Smart Environments: Technologies, Protocols, and Applications, Network 2004.
  7. Hemanta Kumar Kalita, Avijit Kar “WIRELESS SENSOR NETWORK SECURITY ANALYSIS",International Journal of Next-Generation NetworksIJNGN),Vol.1, No.1, December 2009.
  8. Anoop MS, "Elliptic Curve Cryptography-An Implementation", www.security.ittoolbox.com/research.
  9. J.Katz and Y.Kindell, "Introduction to Modern Cryptography", Champan and Hall/CRC 2008
  10. Ian Curry "An Introduction to Cryptography and Digital Signatures", Copyright-Entrust, version 2.0, March 2002.
  11. Dr.Rahul Banerjee, Introducton to Symmetric Key Cryptography, BITS Pilani presentation.
  12. B.A.Frouoazan, "Cryptography and Network Security",International Edition McGrraw Hill, 2008
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks PKI Elliptical Curve Cryptography SunSpot devices