CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC

by Asha Rani Mishra, Anju Gera, Bhawna Chauhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 10
Year of Publication: 2014
Authors: Asha Rani Mishra, Anju Gera, Bhawna Chauhan
10.5120/15671-4257

Asha Rani Mishra, Anju Gera, Bhawna Chauhan . Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC. International Journal of Computer Applications. 89, 10 ( March 2014), 34-41. DOI=10.5120/15671-4257

@article{ 10.5120/15671-4257,
author = { Asha Rani Mishra, Anju Gera, Bhawna Chauhan },
title = { Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 10 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number10/15671-4257/ },
doi = { 10.5120/15671-4257 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:55.249393+05:30
%A Asha Rani Mishra
%A Anju Gera
%A Bhawna Chauhan
%T Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 10
%P 34-41
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and disseminating for monitoring specific applications such as emergency services, disaster management, and military applications etc. Since large number sensor nodes are deployed to monitor a vast field, where the operational conditions are most often harsh or even hostile so security mechanism in WSN is a greater challenge in WSN. Sensor networks pose unique challenges because of their inherent limitations in communication and computing. Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission. The threats against WSN can be reduced by proper security measures. One of the commonly used methods is the use of cryptographic algorithm. This paper proposes mechanisms for Key Predistribution and mutual Authentication protocol in sensor networks using ECC with respect to constraints of WSN.

References
  1. Guo Xiao Wang, Zhu Jianyong, Analysis and Design of Energy-oriented Security Protocols for Wireless Sensor Networks,"2011
  2. Hero Modares Rosli Salleh Amirhossein Moravejosharieh, Overview of security issues in Wireless Sensor Network,"2011
  3. E. Yoneki and J. Bacon ,"A survey of Wireless sensor Network technologies,"2005.
  4. J. P Walters, et al. " Wireless Sensor network security: A survey, "2007
  5. Hero Modares Rosli, Salleh Amirhossein ,Moravejo sharieh, Wireless Network Security Using Elliptic Curve Cryptography," 2011
  6. Moncef Amara and Amar Siad," Elliptic curve Cryptography and its applications", 2011
  7. Guo Xiaowang, Zhu Jianyong, Research o"n Security Issues in Wireless sensor networks,"2011
  8. Yong Wang, Garhan Attebury, and Byrav Ramamurthy A Survey of security issues in wireless sensor networks, University of Nebraska-Lincoln
  9. Pathan,A-S. K. ,Alam,M. ,Manowar,M. ,and Rabbi,F. ,"An efficient Routing Protocol for Mobile Ad Hoc networks with Neighbour Awarness and Multicasting. ,Proc IEEE E-Tech Karachi I,2004,PP. 97-100
  10. C. P Fleeger,Security in Computing,3rd edition,prentice_Hall Inc. NJ. 2003
Index Terms

Computer Science
Information Sciences

Keywords

Public Key Cryptography ECC WSN Attacks Key management authentication