![]() |
10.5120/15671-4257 |
Asha Rani Mishra, Anju Gera and Bhawna Chauhan. Article: Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC. International Journal of Computer Applications 89(10):34-41, March 2014. Full text available. BibTeX
@article{key:article, author = {Asha Rani Mishra and Anju Gera and Bhawna Chauhan}, title = {Article: Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {89}, number = {10}, pages = {34-41}, month = {March}, note = {Full text available} }
Abstract
Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and disseminating for monitoring specific applications such as emergency services, disaster management, and military applications etc. Since large number sensor nodes are deployed to monitor a vast field, where the operational conditions are most often harsh or even hostile so security mechanism in WSN is a greater challenge in WSN. Sensor networks pose unique challenges because of their inherent limitations in communication and computing. Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission. The threats against WSN can be reduced by proper security measures. One of the commonly used methods is the use of cryptographic algorithm. This paper proposes mechanisms for Key Predistribution and mutual Authentication protocol in sensor networks using ECC with respect to constraints of WSN.
References
- Guo Xiao Wang, Zhu Jianyong, Analysis and Design of Energy-oriented Security Protocols for Wireless Sensor Networks,"2011
- Hero Modares Rosli Salleh Amirhossein Moravejosharieh, Overview of security issues in Wireless Sensor Network,"2011
- E. Yoneki and J. Bacon ,"A survey of Wireless sensor Network technologies,"2005.
- J. P Walters, et al. " Wireless Sensor network security: A survey, "2007
- Hero Modares Rosli, Salleh Amirhossein ,Moravejo sharieh, Wireless Network Security Using Elliptic Curve Cryptography," 2011
- Moncef Amara and Amar Siad," Elliptic curve Cryptography and its applications", 2011
- Guo Xiaowang, Zhu Jianyong, Research o"n Security Issues in Wireless sensor networks,"2011
- Yong Wang, Garhan Attebury, and Byrav Ramamurthy A Survey of security issues in wireless sensor networks, University of Nebraska-Lincoln
- Pathan,A-S. K. ,Alam,M. ,Manowar,M. ,and Rabbi,F. ,"An efficient Routing Protocol for Mobile Ad Hoc networks with Neighbour Awarness and Multicasting. ,Proc IEEE E-Tech Karachi I,2004,PP. 97-100
- C. P Fleeger,Security in Computing,3rd edition,prentice_Hall Inc. NJ. 2003