Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks

被引:0
|
作者
Vijayalakshmi, V. [1 ]
Palanivelu, T. G. [1 ]
机构
[1] Pondicherry Engn Coll, Pondicherry 605014, India
关键词
Elliptic Curve Cryptography (ECC); ECC key exchange; Localization; TOA localization scheme; Wireless Sensor Networks (WSNs);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The crucial problem in Wireless Sensor Networks (WSNs) is position estimation or Localization, due to their dynamic method of deployment. There are several methods in determining their physical locations but the greatest challenge imposed is in communicating with their authenticated neighbors, their precise location in a secured manner. The mutual authentication between sensor nodes is of vital importance i.e. node should only accept and forward their own precise location messages from authenticated neighbors. The objective of this paper is to solve this problem of insecurity in sensor networks. Against the popular belief that public key cryptographic schemes are not practical for sensors, an authentication technique which makes use of Elliptic Curve Cryptography (ECC) along with the TOA positioning scheme is implemented. ECC has got excellent enhanced features which include smaller key size, lesser bandwidth, higher computational capability and lesser hardware. This new technique is compared for its performance with Rivest-Shamir-Adelman (RSA) and Mean Power with Rivest-Shamir-Adelman (MPRSA). The simulation results clearly indicate that ECC is well suited for secure localization in sensor networks as it satisfies the constraints of the sensor networks which include minimum bandwidth, power, energy and computational speed.
引用
收藏
页码:255 / 261
页数:7
相关论文
共 50 条
  • [31] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [32] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [33] A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Liu, Pin-Chuan
    Kim, Tai-Hoo
    Wei, Hsin-Wen
    SENSORS, 2011, 11 (05) : 4767 - 4779
  • [34] A Survey: A Secure Routing Method for Detecting False Reports and Gray-hole Attacks along with Elliptic Curve Cryptography in Wireless Sensor Networks
    Sakharkar, Sneha M.
    Mangrulkar, R. S.
    Atique, Mohammad
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [35] A Fast Window-based Scalar Multiplication Algorithm for Elliptic Curve Cryptography in Wireless Sensor Networks
    Ye, Hung-Nan
    Wang, Kuochen
    Jan, Rong-Hong
    Hu, Yuh-Jyh
    Tseng, Yu-Chee
    Hsu, Yi-Huai
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1646 - 1655
  • [36] Accelerated precomputation points-based scalar reduction on elliptic curve cryptography for wireless sensor networks
    Faye, Youssou
    Guyennet, Herve
    Yanbo, Shou
    Niang, Ibrahima
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [37] An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography
    Le, Xuan Hung
    Lee, Sungyoung
    Butun, Ismail
    Khalid, Murad
    Sankar, Ravi
    Kim, Miso
    Han, Manhyung
    Lee, Young-Koo
    Lee, Heejo
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (06) : 599 - 606
  • [38] Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks
    Prakash, Shiva
    Rajput, Ashish
    AMBIENT COMMUNICATIONS AND COMPUTER SYSTEMS, RACCCS 2017, 2018, 696 : 589 - 599
  • [39] Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography
    Khajuria, Samant
    Tange, Henrik
    2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 713 - +
  • [40] Secure and resilient localization in wireless sensor networks
    Ning, Peng
    Liu, Donggang
    Du, Wenliang
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 161 - +