Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks

被引:0
|
作者
Vijayalakshmi, V. [1 ]
Palanivelu, T. G. [1 ]
机构
[1] Pondicherry Engn Coll, Pondicherry 605014, India
关键词
Elliptic Curve Cryptography (ECC); ECC key exchange; Localization; TOA localization scheme; Wireless Sensor Networks (WSNs);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The crucial problem in Wireless Sensor Networks (WSNs) is position estimation or Localization, due to their dynamic method of deployment. There are several methods in determining their physical locations but the greatest challenge imposed is in communicating with their authenticated neighbors, their precise location in a secured manner. The mutual authentication between sensor nodes is of vital importance i.e. node should only accept and forward their own precise location messages from authenticated neighbors. The objective of this paper is to solve this problem of insecurity in sensor networks. Against the popular belief that public key cryptographic schemes are not practical for sensors, an authentication technique which makes use of Elliptic Curve Cryptography (ECC) along with the TOA positioning scheme is implemented. ECC has got excellent enhanced features which include smaller key size, lesser bandwidth, higher computational capability and lesser hardware. This new technique is compared for its performance with Rivest-Shamir-Adelman (RSA) and Mean Power with Rivest-Shamir-Adelman (MPRSA). The simulation results clearly indicate that ECC is well suited for secure localization in sensor networks as it satisfies the constraints of the sensor networks which include minimum bandwidth, power, energy and computational speed.
引用
收藏
页码:255 / 261
页数:7
相关论文
共 50 条
  • [41] Secure localization algorithms for wireless sensor networks
    Boukerche, Azzedine
    Oliveira, Horacio A. B. F.
    Nakamura, Eduardo F.
    Loureiro, Antonio A. F.
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 96 - 101
  • [42] Secure centralized localization for wireless sensor networks
    Zhang, T. (zhangting06@emails.bjut.edu.cn), 2012, Huazhong University of Science and Technology (40):
  • [43] Secure localization in wireless sensor networks: A survey
    Jiang J.
    Han G.
    Zhu C.
    Dong Y.
    Zhang N.
    Journal of Communications, 2011, 6 (06): : 460 - 470
  • [44] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [45] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [46] Competing secure text encryption in intranet using elliptic curve cryptography
    Kumari, Arpana
    Kapoor, Vivek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 631 - 641
  • [47] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [48] A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
    Rajendiran, Kishore
    Sankararajan, Radha
    Palaniappan, Ramasamy
    ETRI JOURNAL, 2011, 33 (05) : 791 - 801
  • [49] Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks
    Monika
    Upadhyaya, Shuchita
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 808 - 813
  • [50] A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Shi, Wenbo
    Gong, Peng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,