[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design and develop security measures to protect information from various security risks and threats. Wireless Sensor Networks (WSNs) hold significant importance in this era of the technological world; as its wide range of applications are being used around the globe in almost every domain. WSNs are being deployed with several constraints and limitations, due to which deploying security mechanisms on such networks becomes a difficult task for the developers. This research work specifically targeted security issues in WSNs and hence subjected to provide authentication and data encryption in a novel manner for node-to-node communication. The proposed scheme not only provides security for the node to node communication network but also hoards memory space on nodes with the help of Elliptic Curve Digital Signature (ECDSA) cryptographic scheme to provide an appropriate mechanism for measuring key generation time, count of hello message and packet size. Furthermore, the Algorithm for Wireless Secure Communication (ASCW) also provides key management with acceptable key length. In addition to this, ASCW helps in securing the communication on node level which helps in securing the whole network in a better and efficient manner. ASCW also reduces the cost of risk and security threats on the network with the help of authentication mechanism. A physical testbed has designed based on devices and sensor motes according to the required specifications. The proposed solutions have evaluated in terms of key generation time, several hello message and size of data packets. Experimental results have indicated that ASCW is one of the suitable and a novel approach for securing data on nodes during communication in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Aliero MS, Ghani I, Qureshi KN, Rohani MFA (2020) An algorithm for detecting SQL injection vulnerability using black-box testing. J Ambient Intell Human Comput 11(1):249–266

    Article  Google Scholar 

  • Alkady Y, Habib MI, Rizk RY (2013) A new security protocol using hybrid cryptography algorithms. In: Paper presented at the 2013 9th International Computer Engineering Conference (ICENCO)

  • Alkhatib AAA, Baicher GS (2012) Wireless sensor network architecture. In: Paper presented at the 2012 international conference on computer networks and communication systems (CNCS 2012)

  • Amin R, Islam SH, Biswas G, Obaidat MS (2018) A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Netw 75:1–18

    Article  Google Scholar 

  • Bashaa MH, Al-Alak SM, Idrees AK (2019) Secret key generation in wireless sensor network using public key encryption. In: Paper presented at the proceedings of the international conference on information and communication technology

  • Bashirpour H, Bashirpour S, Shamshirband S, Chronopoulos A (2018) An improved digital signature protocol to multi-user broadcast authentication based on elliptic curve cryptography in wireless sensor networks (wsns). Math Comput Appl 23(2):17

    Google Scholar 

  • Bharanidharan S, Swathy N, Sujithra M (2016) Implementing hash function SHA-1 with RSA and ECC encryption algorithm to enhance the data security. In: IEEE 3rd international conference on innovations in information embedded and communication systems. IEEE

  • Burhanuddin M, Mohammed AA-J, Ismail R, Hameed ME, Kareem AN, Basiron H (2018) A review on security challenges and features in wireless sensor networks: IoT perspective. J Telecommun Electron Comput Eng 10(1-7):17–21

    Google Scholar 

  • Burri N, Flury R, Nellen S, Sigg B, Sommer P, Wattenhofer R (2009) YETI: an Eclipse plug-in for TinyOS 2.1. In: Paper presented at the proceedings of the 7th ACM conference on embedded networked sensor systems

  • Chang Q, Zhang YP, Qin LL (2010) A node authentication protocol based on ECC in WSN. In: 2010 international conference on computer design and applications, vol 2. IEEE, pp V2-606

  • El-mawla NA, Badawy M, Arafat H (2019) Security and key management challenges over WSN (ASurvey). Int J Comput Sci Eng Surv (IJCSES) 10(1):15–34

    Article  Google Scholar 

  • Gay D, Levis P, Von Behren R, Welsh M, Brewer E, Culler D (2014) The nesC language: a holistic approach to networked embedded systems. Acm Sigplan Notices 49(4):41–51

    Article  Google Scholar 

  • Hari PB, Singh SN (2016) Security issues in wireless sensor networks: current research and challenges. In: Paper presented at the 2016 international conference on advances in computing, communication, & automation (ICACCA)(Spring)

  • Haseeb K, Islam N, Almogren A, Din IU, Almajed HN, Guizani N (2019) Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7:79980–79988

    Article  Google Scholar 

  • Imem AA (2015) Comparison and evaluation of digital signature schemes employed in NDN network. arXiv preprint arXiv:1508.00184

  • Iqbal S, Abdullah AH, Qureshi KN (2017a) Channel quality and utilization metric for interference estimation in Wireless Mesh Networks. Comput Electr Eng 64:420–435

    Article  Google Scholar 

  • Iqbal S, Abdullah AH, Qureshi KN, Lloret J (2017b) Soft-GORA: soft constrained globally optimal resource allocation for critical links in IoT backhaul communication. IEEE Access 6:614–624

    Article  Google Scholar 

  • Jain U, Hussain M(2018) Wireless sensor networks: attacks and countermeasures. In: Paper presented at the proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT)

  • Jeong Y-S, Lee S-H (2007) Hybrid key establishment protocol based on ecc for wireless sensor network. In: Paper presented at the international conference on ubiquitous intelligence and computing

  • Jiang L, Li T, Li X, Atiquzzaman M, Ahmad H, Wang X (2018) Anonymous communication via anonymous identity-based encryption and its application in IoT. Wirel Commun Mobile Comput 2018:1–8

    Google Scholar 

  • Ju S (2012) A lightweight key establishment in wireless sensor network based on elliptic curve cryptography.In: Paper presented at the 2012 IEEE international conference on intelligent control, automatic detection and high-end equipment

  • Kardi, A., Zagrouba, R., & Alqahtani, M. (2018). Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks. Paper presented at the 2018 21st Saudi Computer Society National Computer Conference (NCC)

  • Karthikeyan B, Kumar R, Inabathini SR (2018) Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES]. Int J Reason-based Intell Syst 10(3–4):219–223

    Google Scholar 

  • Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J inf Assur Secur 5(1):31–44

    Google Scholar 

  • Kumar V, Jain A, Barwal P (2014) Wireless sensor networks: security issues, challenges and solutions. Int J Inf Comput Technol 4(8):859–868

    Google Scholar 

  • Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intell Humaniz Comput 10(2):641–660

    Article  Google Scholar 

  • Lee B, Bae S, Han D (2008). Design of network management platform and security framework for WSN. In: Paper presented at the 2008 IEEE international conference on signal image technology and internet based systems

  • Levis P, Madden S, Polastre J, Szewczyk R, Whitehouse K, Woo A, Brewer E (2005) TinyOS: An operating system for sensor networks. In: Ambient intelligence. Springer, New York, pp 115–148

  • Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39–50

    Article  Google Scholar 

  • Naresh VS, Sivaranjani R, Murthy VESN (2018) Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks. Int J Commun Syst 31(15):e3763

    Article  Google Scholar 

  • Qureshi KN, Abdullah AH (2014) Adaptation of wireless sensor network in industries and their architecture, standards and applications. World Appl Sci J 30(10):1218–1223

    Google Scholar 

  • Qureshi KN, Bashir F, Abdullah AH (2017) Provision of security in vehicular ad hoc networks through an intelligent secure routing scheme. In: Paper presented at the 2017 international conference on frontiers of information technology (FIT)

  • Qureshi KN, Abdullah AH, Bashir F, Iqbal S, Awan KM (2018) Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks. Int J Commun Syst 31(8):e3533

    Article  Google Scholar 

  • Qureshi KN, Din S, Jeon G, Piccialli F (2020) Link quality and energy utilization based preferable next hop selection routing for wireless body area networks. Comput Commun 149:382–392

    Article  Google Scholar 

  • Raj SP, Renold AP (2015) An enhanced elliptic curve algorithm for secured data transmission in wireless sensor network. In: Paper presented at the 2015 global conference on communication technologies (GCCT)

  • Rajput M, Ghawte U (2017) Security challenges in wireless sensor networks. Int J Comput Appl 168:24–29

    Google Scholar 

  • Selvam R, Senthilkumar A (2014) Cryptography based secure multipath routing protocols in wireless sensor network: a survey. In: Paper presented at the 2014 international conference on electronics and communication systems (ICECS)

  • Seo H (2018) Compact software implementation of public-key cryptography on MSP430X. ACM Trans Embed Comput Syst (TECS) 17(3):66

    Google Scholar 

  • Seo SC, Kim HC, Ramakrishna R (2006) A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks. In: Paper presented at the international conference on embedded and ubiquitous computing

  • Sharma C, Vaid R (2019) Analysis of existing protocols in WSN based on key parameters. In: Paper presented at the proceedings of 2nd international conference on communication, computing and networking

  • Solomon M, Elias EP (2018) Privacy protection for wireless medical sensor data. Int J Sci Res Sci Technol 4(2):1439–1440

    Google Scholar 

  • Srinivas J, Mishra D, Mukhopadhyay S, Kumari S (2018) Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intell Humaniz Comput 9(4):875–895

    Article  Google Scholar 

  • Sumalatha MS, Nandalal V (2020) An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01834-1

    Article  Google Scholar 

  • Sutrala AK, Das AK, Kumar N, Reddy AG, Vasilakos AV, Rodrigues JJ (2018) On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. Int J Commun Syst 31(8):e3514

    Article  Google Scholar 

  • Wang W-h, Cui Y-l, Chen T-m (2009) Design and implementation of an ECDSA-based identity authentication protocol on WSN. In: Paper presented at the 2009 3rd IEEE international symposium on microwave, antenna, propagation and EMC technologies for wireless communications

  • Wei Z, Li J, Wang X, Gao C-Z (2019) A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing. IEEE Access 7:62785–62793

    Article  Google Scholar 

  • Wu L, Xu Z, He D, Wang X (2018) New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Secur Commun Netw. https://doi.org/10.1155/2018/2595273

    Article  Google Scholar 

  • Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394

    Article  Google Scholar 

  • Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

  • Yang Z, Lai J, Sun Y, Zhou J (2019) A novel authenticated key agreement protocol with dynamic credential for WSNs. ACM Trans Sensor Netw (TOSN) 15(2):22

    Google Scholar 

  • Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779

    Article  Google Scholar 

  • Yetgin H, Cheung KTK, El-Hajjar M, Hanzo LH (2017) A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun Surv Tutor 19(2):828–854

    Article  Google Scholar 

  • Zhang K, Xu K, Wei F (2018) A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks. Wirel Commun Mobile Comput

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashif Naseer Qureshi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qazi, R., Qureshi, K.N., Bashir, F. et al. Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. J Ambient Intell Human Comput 12, 547–566 (2021). https://doi.org/10.1007/s12652-020-02020-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02020-z

Keywords

Navigation