CFP last date
20 January 2025
Reseach Article

Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks

by Stephen Aikins-Bekoe, James Ben Hayfron-Acquah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 10
Year of Publication: 2020
Authors: Stephen Aikins-Bekoe, James Ben Hayfron-Acquah
10.5120/ijca2020920015

Stephen Aikins-Bekoe, James Ben Hayfron-Acquah . Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks. International Journal of Computer Applications. 176, 10 ( Apr 2020), 1-8. DOI=10.5120/ijca2020920015

@article{ 10.5120/ijca2020920015,
author = { Stephen Aikins-Bekoe, James Ben Hayfron-Acquah },
title = { Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2020 },
volume = { 176 },
number = { 10 },
month = { Apr },
year = { 2020 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number10/31234-2020920015/ },
doi = { 10.5120/ijca2020920015 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:42:05.911310+05:30
%A Stephen Aikins-Bekoe
%A James Ben Hayfron-Acquah
%T Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 10
%P 1-8
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSNs) with traditional cryptography are applied in many areas including healthcare, earth sensing and area monitoring. However, severe security constraints coupled with malicious attacks and threats revolve around the implementation of Wireless Sensor Networks which pose undesirable security performance as well as affect the maintenance of proper functionality of wireless sensor systems. Due to such circumstances, it is important to recognise the need for a holistic and robust security to ensure WSNs are well established and protected. In this study a more robust technique for a wireless sensor network system is employed. The algorithm for Elliptic Curve Diffie Hellman key exchange is studied and analyzed using PyCryptodome package and the Elliptic Curve Integrated Encryption Scheme. The study is carried out in comparison to Rivest-Shamir-Adleman (RSA) to assess the strengths of ECC in key generation and encryption/decryption process. The results obtained from the analysis reveals that ECC provides a higher level of security and also has very small key size in comparison to RSA, which makes possible implementations more compact for some level of security.

References
  1. Ali, M. Zulfiker, (2013). A robust user authentication scheme for wireless networks, Toronto, Ontario, Canada.
  2. Anoop M.S. (2000), Elliptic Curve Cryptography, An Implementation Guide.
  3. Ayaz H. M., Ummer I. & Mohiuddin B. (2016), Secured Data Acquisition System for Smart Water Applications using WSN, Indian Journal of Science and Technology, 9(10), DOI: 10.17485/ijst/2016/v9i10/86694
  4. Blab E. O. and Zitterbart M. (2005), Efficient implementation of elliptic curve cryptography for wireless sensor networks. Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, German.
  5. Boussag L. (2017), Implementation and Simulation of Security Protocols for Wireless Sensor Networks (WSNs).
  6. Haakegaard R., and Lang J. (2015), The Elliptic Curve Diffie- Hellman (ECDH) Hankerson, D. et al. (2000) “Guide to Elliptic Curve Cryptography” Springer.
  7. Legrandin (2018), PyCryptodome Documentation, Release 3.6.1.
  8. Miller, V. (1985), “Use of elliptic curves in cryptography”, Advances in Cryptology - CRYPTO ’85 Proceedings, Springer Lecture Notes in Computer Science (LNCS), vol. 218
  9. Rehana, J., (2009). Security ofWireless Sensor Network. TKK T-110.5190 Seminar on Internetworking.
  10. U.S. Department of Commerce (2013), National Institute of Standards and Technology (NIST), ”Digital Signature Standard (DSS)”, FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (FIPS), Gaithersburg, MD 20899-8900.
  11. Vagle L. J. (2000), A Gentle Introduction to Elliptic Curve Cryptography, BBN Technologies.
  12. Washingtion, Lawrence C. (2003), Elliptic Curves: Number Theory and Cryptography. Boca Raton, FL: CRC Press.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Diffie-Hellman Wireless Sensor Network Public key Encryption Decryption