International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 133 - Number 13 |
Year of Publication: 2016 |
Authors: Ayaz Hassan Moon, Ummer Iqbal |
10.5120/ijca2016908175 |
Ayaz Hassan Moon, Ummer Iqbal . Authentication Protocols for WSN using ECC and Hidden Generator. International Journal of Computer Applications. 133, 13 ( January 2016), 42-47. DOI=10.5120/ijca2016908175
Authentication is an important Security primitive in any class of network both at the entity level as well as at the message level. All the network entities comprising of WSN including nodes, cluster heads and base station need to be authenticated before sending or receiving any kind of communication within them. Public Key Cryptography offers broad based solutions to address all the security concerns. However such solutions are far too expensive to be applied directly to WSN owing to its resource constraints. ECC and its variant Tiny- ECC offers the scope and the potential to build light weight solutions for WSN based networks. In this paper, light weight authentication protocols for Base to Node, Node to Base and Node to Node have been presented. These protocols are based on Elliptical Curve Cryptography and Hidden Generator Concepts. Hash Chains which are computationally light have been also used. The protocols have been developed in TinyOS, the defacto operating system for WSN and simulated in Tossim .The protocols have been ported to WSN hardware targeting MicaZ mote. The paper also brings out performance parameters of the developed protocols.