Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks

被引:0
|
作者
Vijayalakshmi, V. [1 ]
Palanivelu, T. G. [1 ]
机构
[1] Pondicherry Engn Coll, Pondicherry 605014, India
关键词
Elliptic Curve Cryptography (ECC); ECC key exchange; Localization; TOA localization scheme; Wireless Sensor Networks (WSNs);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The crucial problem in Wireless Sensor Networks (WSNs) is position estimation or Localization, due to their dynamic method of deployment. There are several methods in determining their physical locations but the greatest challenge imposed is in communicating with their authenticated neighbors, their precise location in a secured manner. The mutual authentication between sensor nodes is of vital importance i.e. node should only accept and forward their own precise location messages from authenticated neighbors. The objective of this paper is to solve this problem of insecurity in sensor networks. Against the popular belief that public key cryptographic schemes are not practical for sensors, an authentication technique which makes use of Elliptic Curve Cryptography (ECC) along with the TOA positioning scheme is implemented. ECC has got excellent enhanced features which include smaller key size, lesser bandwidth, higher computational capability and lesser hardware. This new technique is compared for its performance with Rivest-Shamir-Adelman (RSA) and Mean Power with Rivest-Shamir-Adelman (MPRSA). The simulation results clearly indicate that ECC is well suited for secure localization in sensor networks as it satisfies the constraints of the sensor networks which include minimum bandwidth, power, energy and computational speed.
引用
收藏
页码:255 / 261
页数:7
相关论文
共 50 条
  • [21] A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography
    Dai, Cong
    Xu, Zhongwei
    AD HOC NETWORKS, 2022, 127
  • [22] On the Practicality of Elliptic Curve Cryptography for Medical Sensor Networks
    Baehr, Dan
    McKinney, Steve
    Quirk, Aaron
    Harfoush, Khaled
    2014 11TH ANNUAL HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (PHOTONICS FOR ENERGY), 2014, : 41 - 45
  • [23] Application of elliptic curve cryptography in ZigBee wireless sensor network
    1600, International Frequency Sensor Association, 46 Thorny Vineway, Toronto, ON M2J 4J2, Canada (21):
  • [24] Secure multicasting in wireless sensor networks using identity based cryptography
    Sampradeepraj, T.
    Devi, V. Anusuya
    Raja, S. P.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (01):
  • [25] An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography
    Li, Chun-Ta
    Lee, Cheng-Chi
    Lee, Chin-Wen
    SENSOR LETTERS, 2013, 11 (05) : 958 - 965
  • [26] Secure localization in wireless sensor networks
    Zhang, Yanchao
    Liu, Wei
    Fang, Yuguang
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 3169 - 3175
  • [27] MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
    Liu, Zhe
    Wenger, Erich
    Grossschaedl, Johann
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 361 - 379
  • [28] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [29] NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    Szczechowiak, Piotr
    Oliveira, Leonardo B.
    Scott, Michael
    Collier, Martin
    Dahab, Ricardo
    WIRELESS SENSOR NETWORKS, 2008, 4913 : 305 - +
  • [30] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145