Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 10
Year of Publication: 2014
Asha Rani Mishra
Anju Gera
Bhawna Chauhan

Asha Rani Mishra, Anju Gera and Bhawna Chauhan. Article: Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC. International Journal of Computer Applications 89(10):34-41, March 2014. Full text available. BibTeX

	author = {Asha Rani Mishra and Anju Gera and Bhawna Chauhan},
	title = {Article: Secure key Predistribution and Mutual Node Authentication Protocol in WSN using ECC},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {10},
	pages = {34-41},
	month = {March},
	note = {Full text available}


Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and disseminating for monitoring specific applications such as emergency services, disaster management, and military applications etc. Since large number sensor nodes are deployed to monitor a vast field, where the operational conditions are most often harsh or even hostile so security mechanism in WSN is a greater challenge in WSN. Sensor networks pose unique challenges because of their inherent limitations in communication and computing. Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission. The threats against WSN can be reduced by proper security measures. One of the commonly used methods is the use of cryptographic algorithm. This paper proposes mechanisms for Key Predistribution and mutual Authentication protocol in sensor networks using ECC with respect to constraints of WSN.


  • Guo Xiao Wang, Zhu Jianyong, Analysis and Design of Energy-oriented Security Protocols for Wireless Sensor Networks,"2011
  • Hero Modares Rosli Salleh Amirhossein Moravejosharieh, Overview of security issues in Wireless Sensor Network,"2011
  • E. Yoneki and J. Bacon ,"A survey of Wireless sensor Network technologies,"2005.
  • J. P Walters, et al. " Wireless Sensor network security: A survey, "2007
  • Hero Modares Rosli, Salleh Amirhossein ,Moravejo sharieh, Wireless Network Security Using Elliptic Curve Cryptography," 2011
  • Moncef Amara and Amar Siad," Elliptic curve Cryptography and its applications", 2011
  • Guo Xiaowang, Zhu Jianyong, Research o"n Security Issues in Wireless sensor networks,"2011
  • Yong Wang, Garhan Attebury, and Byrav Ramamurthy A Survey of security issues in wireless sensor networks, University of Nebraska-Lincoln
  • Pathan,A-S. K. ,Alam,M. ,Manowar,M. ,and Rabbi,F. ,"An efficient Routing Protocol for Mobile Ad Hoc networks with Neighbour Awarness and Multicasting. ,Proc IEEE E-Tech Karachi I,2004,PP. 97-100
  • C. P Fleeger,Security in Computing,3rd edition,prentice_Hall Inc. NJ. 2003