Abstract
Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design and develop security measures to protect information from various security risks and threats. Wireless Sensor Networks (WSNs) hold significant importance in this era of the technological world; as its wide range of applications are being used around the globe in almost every domain. WSNs are being deployed with several constraints and limitations, due to which deploying security mechanisms on such networks becomes a difficult task for the developers. This research work specifically targeted security issues in WSNs and hence subjected to provide authentication and data encryption in a novel manner for node-to-node communication. The proposed scheme not only provides security for the node to node communication network but also hoards memory space on nodes with the help of Elliptic Curve Digital Signature (ECDSA) cryptographic scheme to provide an appropriate mechanism for measuring key generation time, count of hello message and packet size. Furthermore, the Algorithm for Wireless Secure Communication (ASCW) also provides key management with acceptable key length. In addition to this, ASCW helps in securing the communication on node level which helps in securing the whole network in a better and efficient manner. ASCW also reduces the cost of risk and security threats on the network with the help of authentication mechanism. A physical testbed has designed based on devices and sensor motes according to the required specifications. The proposed solutions have evaluated in terms of key generation time, several hello message and size of data packets. Experimental results have indicated that ASCW is one of the suitable and a novel approach for securing data on nodes during communication in WSNs.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aliero MS, Ghani I, Qureshi KN, Rohani MFA (2020) An algorithm for detecting SQL injection vulnerability using black-box testing. J Ambient Intell Human Comput 11(1):249–266
Alkady Y, Habib MI, Rizk RY (2013) A new security protocol using hybrid cryptography algorithms. In: Paper presented at the 2013 9th International Computer Engineering Conference (ICENCO)
Alkhatib AAA, Baicher GS (2012) Wireless sensor network architecture. In: Paper presented at the 2012 international conference on computer networks and communication systems (CNCS 2012)
Amin R, Islam SH, Biswas G, Obaidat MS (2018) A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Netw 75:1–18
Bashaa MH, Al-Alak SM, Idrees AK (2019) Secret key generation in wireless sensor network using public key encryption. In: Paper presented at the proceedings of the international conference on information and communication technology
Bashirpour H, Bashirpour S, Shamshirband S, Chronopoulos A (2018) An improved digital signature protocol to multi-user broadcast authentication based on elliptic curve cryptography in wireless sensor networks (wsns). Math Comput Appl 23(2):17
Bharanidharan S, Swathy N, Sujithra M (2016) Implementing hash function SHA-1 with RSA and ECC encryption algorithm to enhance the data security. In: IEEE 3rd international conference on innovations in information embedded and communication systems. IEEE
Burhanuddin M, Mohammed AA-J, Ismail R, Hameed ME, Kareem AN, Basiron H (2018) A review on security challenges and features in wireless sensor networks: IoT perspective. J Telecommun Electron Comput Eng 10(1-7):17–21
Burri N, Flury R, Nellen S, Sigg B, Sommer P, Wattenhofer R (2009) YETI: an Eclipse plug-in for TinyOS 2.1. In: Paper presented at the proceedings of the 7th ACM conference on embedded networked sensor systems
Chang Q, Zhang YP, Qin LL (2010) A node authentication protocol based on ECC in WSN. In: 2010 international conference on computer design and applications, vol 2. IEEE, pp V2-606
El-mawla NA, Badawy M, Arafat H (2019) Security and key management challenges over WSN (ASurvey). Int J Comput Sci Eng Surv (IJCSES) 10(1):15–34
Gay D, Levis P, Von Behren R, Welsh M, Brewer E, Culler D (2014) The nesC language: a holistic approach to networked embedded systems. Acm Sigplan Notices 49(4):41–51
Hari PB, Singh SN (2016) Security issues in wireless sensor networks: current research and challenges. In: Paper presented at the 2016 international conference on advances in computing, communication, & automation (ICACCA)(Spring)
Haseeb K, Islam N, Almogren A, Din IU, Almajed HN, Guizani N (2019) Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7:79980–79988
Imem AA (2015) Comparison and evaluation of digital signature schemes employed in NDN network. arXiv preprint arXiv:1508.00184
Iqbal S, Abdullah AH, Qureshi KN (2017a) Channel quality and utilization metric for interference estimation in Wireless Mesh Networks. Comput Electr Eng 64:420–435
Iqbal S, Abdullah AH, Qureshi KN, Lloret J (2017b) Soft-GORA: soft constrained globally optimal resource allocation for critical links in IoT backhaul communication. IEEE Access 6:614–624
Jain U, Hussain M(2018) Wireless sensor networks: attacks and countermeasures. In: Paper presented at the proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT)
Jeong Y-S, Lee S-H (2007) Hybrid key establishment protocol based on ecc for wireless sensor network. In: Paper presented at the international conference on ubiquitous intelligence and computing
Jiang L, Li T, Li X, Atiquzzaman M, Ahmad H, Wang X (2018) Anonymous communication via anonymous identity-based encryption and its application in IoT. Wirel Commun Mobile Comput 2018:1–8
Ju S (2012) A lightweight key establishment in wireless sensor network based on elliptic curve cryptography.In: Paper presented at the 2012 IEEE international conference on intelligent control, automatic detection and high-end equipment
Kardi, A., Zagrouba, R., & Alqahtani, M. (2018). Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks. Paper presented at the 2018 21st Saudi Computer Society National Computer Conference (NCC)
Karthikeyan B, Kumar R, Inabathini SR (2018) Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES]. Int J Reason-based Intell Syst 10(3–4):219–223
Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J inf Assur Secur 5(1):31–44
Kumar V, Jain A, Barwal P (2014) Wireless sensor networks: security issues, challenges and solutions. Int J Inf Comput Technol 4(8):859–868
Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intell Humaniz Comput 10(2):641–660
Lee B, Bae S, Han D (2008). Design of network management platform and security framework for WSN. In: Paper presented at the 2008 IEEE international conference on signal image technology and internet based systems
Levis P, Madden S, Polastre J, Szewczyk R, Whitehouse K, Woo A, Brewer E (2005) TinyOS: An operating system for sensor networks. In: Ambient intelligence. Springer, New York, pp 115–148
Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39–50
Naresh VS, Sivaranjani R, Murthy VESN (2018) Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks. Int J Commun Syst 31(15):e3763
Qureshi KN, Abdullah AH (2014) Adaptation of wireless sensor network in industries and their architecture, standards and applications. World Appl Sci J 30(10):1218–1223
Qureshi KN, Bashir F, Abdullah AH (2017) Provision of security in vehicular ad hoc networks through an intelligent secure routing scheme. In: Paper presented at the 2017 international conference on frontiers of information technology (FIT)
Qureshi KN, Abdullah AH, Bashir F, Iqbal S, Awan KM (2018) Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks. Int J Commun Syst 31(8):e3533
Qureshi KN, Din S, Jeon G, Piccialli F (2020) Link quality and energy utilization based preferable next hop selection routing for wireless body area networks. Comput Commun 149:382–392
Raj SP, Renold AP (2015) An enhanced elliptic curve algorithm for secured data transmission in wireless sensor network. In: Paper presented at the 2015 global conference on communication technologies (GCCT)
Rajput M, Ghawte U (2017) Security challenges in wireless sensor networks. Int J Comput Appl 168:24–29
Selvam R, Senthilkumar A (2014) Cryptography based secure multipath routing protocols in wireless sensor network: a survey. In: Paper presented at the 2014 international conference on electronics and communication systems (ICECS)
Seo H (2018) Compact software implementation of public-key cryptography on MSP430X. ACM Trans Embed Comput Syst (TECS) 17(3):66
Seo SC, Kim HC, Ramakrishna R (2006) A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks. In: Paper presented at the international conference on embedded and ubiquitous computing
Sharma C, Vaid R (2019) Analysis of existing protocols in WSN based on key parameters. In: Paper presented at the proceedings of 2nd international conference on communication, computing and networking
Solomon M, Elias EP (2018) Privacy protection for wireless medical sensor data. Int J Sci Res Sci Technol 4(2):1439–1440
Srinivas J, Mishra D, Mukhopadhyay S, Kumari S (2018) Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intell Humaniz Comput 9(4):875–895
Sumalatha MS, Nandalal V (2020) An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01834-1
Sutrala AK, Das AK, Kumar N, Reddy AG, Vasilakos AV, Rodrigues JJ (2018) On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. Int J Commun Syst 31(8):e3514
Wang W-h, Cui Y-l, Chen T-m (2009) Design and implementation of an ECDSA-based identity authentication protocol on WSN. In: Paper presented at the 2009 3rd IEEE international symposium on microwave, antenna, propagation and EMC technologies for wireless communications
Wei Z, Li J, Wang X, Gao C-Z (2019) A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing. IEEE Access 7:62785–62793
Wu L, Xu Z, He D, Wang X (2018) New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Secur Commun Netw. https://doi.org/10.1155/2018/2595273
Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
Yang Z, Lai J, Sun Y, Zhou J (2019) A novel authenticated key agreement protocol with dynamic credential for WSNs. ACM Trans Sensor Netw (TOSN) 15(2):22
Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
Yetgin H, Cheung KTK, El-Hajjar M, Hanzo LH (2017) A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun Surv Tutor 19(2):828–854
Zhang K, Xu K, Wei F (2018) A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks. Wirel Commun Mobile Comput
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Qazi, R., Qureshi, K.N., Bashir, F. et al. Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. J Ambient Intell Human Comput 12, 547–566 (2021). https://doi.org/10.1007/s12652-020-02020-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02020-z