We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Energy Saving Secure framework for Sensor Network using Elliptic Curve Cryptography

Published on None 2010 by Shish Ahmad, DR. Mohd. Rizwan beg, Dr. Qamar Abbas
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 4
None 2010
Authors: Shish Ahmad, DR. Mohd. Rizwan beg, Dr. Qamar Abbas
e0f4b993-bc41-4e2c-afdf-7e485c86fdfb

Shish Ahmad, DR. Mohd. Rizwan beg, Dr. Qamar Abbas . Energy Saving Secure framework for Sensor Network using Elliptic Curve Cryptography. Mobile Ad-hoc Networks. MANETS, 4 (None 2010), 167-172.

@article{
author = { Shish Ahmad, DR. Mohd. Rizwan beg, Dr. Qamar Abbas },
title = { Energy Saving Secure framework for Sensor Network using Elliptic Curve Cryptography },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 4 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 167-172 },
numpages = 6,
url = { /specialissues/manets/number4/1037-88/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Shish Ahmad
%A DR. Mohd. Rizwan beg
%A Dr. Qamar Abbas
%T Energy Saving Secure framework for Sensor Network using Elliptic Curve Cryptography
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 4
%P 167-172
%D 2010
%I International Journal of Computer Applications
Abstract

wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape.In sensor network security, an important challenge is the design of protocols to bootstrap the establishment of a secure communications infrastructure from a collection of sensor nodes, which may have been pre-initialized with some secret information but have had no prior direct contact with each other.. Sensor nodes should be resilient to attacks. Since sensor nodes are resource constrained and run on battery, energy consumption should be low to make it operate for many days. In this paper we propose an energy efficient secure framework that proves the authentication, Integrity, and also provides secure communication among sensor nodes by using public key algorithms.

References
  1. Arain Perrig, Robert Szewczyk. SPINS: Security Protocols for Sensor Networks". 2002 Kluwer Academic Publishers.
  2. Bartosz Przydatek, Dawn Song, Adrian Perrigo "SIA: Secure Information Aggregation in Sensor Networks" .SenSys'03, ACM 2003.
  3. Blake, I.; Seroussi, G.; and smart, N. Elliptic Curves in Cryptography. Cambridge; Cambridge University Press, 1999.
  4. D. Balenson, D. McGrew, and A. Sherman, "Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization," IETF Internet draft, August 2000.
  5. H.Chan and A Perrig, "Security and Privacy in Sensor Networks," IEEE Computer, October 2003.
  6. L.Eschenauer and V.Gligor. "A Key-Management Scheme for Distributed Sensor Networks". In Proc.of ACM CCS 2002.
  7. Poosarla R., "Authenticated Route formation and Efficient Key management schemes for Securing Adhoc networks", M.S. Thesis, University of Cincinnati, 2003
  8. William Stallings, "Cryptography and Network Security: Principles and Practice, Second Edition Prentice-Hall 1999 .
  9. John Paul Walters and Zhengqiang Liang. Wireless Sensor Network Security. In Security in Distributed, Grid and Pervasive Computing, 2006.
  10. The Case for Elliptic Curve Cryptography, http://www.nsa.gov/ia/industry/crypto elliptic curve.cfm Dated:31- 05-2008
  11. Willliam Stallings “ Cryptography and Network Security” Principles and Practice” fifth Edition.
  12. Chungen, Yanhong Ge, “The Public Key Encryption to Improve the Security on Wireless Sensor Networks” 2009 Second International Conference on Information and Computing Science,978-0-7695-3634-7/09 $25.00 © 2009 IEEE,DOI 10.1109/ICIC.2009.
  13. Gaubatz, J. Kaps, and B. Sunar, “Public KeyCryptography in Sensor Networks”, Security in Ad-hoc and Sensor Networks, pp. 2-18, 2005.)
  14. Ho®stein, J., Silverman, J., Whyte, W.: “NTRU report 012, version 2. estimated breaking times for NTRU lattices”. Technical Report 12, NTRU Cryptosystems,Inc., Burlington, MA, USA (2003))
  15. David Carman, Vipin Swarup, Daniel Coffin, Ronald Watro, Bruno Dutertre “Security for Wireless Sensor Networks” Foroum Session, 19th Annual Computer Security Applications Conference, December 08
  16. Wander, A.S., Gura, N., Eberle, H., Gupta, V., and Shantz, S.C.,Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks”, In proceedings of PerCom pp. 324-328, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Security Public Key Cryptography Elliptic Curve Cryptography Sensor Network attack RSA