Skip to main content
Top
Published in: Wireless Personal Communications 2/2018

03-01-2018

Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations

Authors: L. Sujihelen, C. Jayakumar

Published in: Wireless Personal Communications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks are the most vulnerable to all the wireless devices due to the massive damage caused by disrupting these networks. A good number of attacks have been launched in the wireless networks which are prevalent in the antagonist world. However, the most difficult of all the attacks is the identification and prevention of the replication of nodes. The time it takes to identify and isolate a cloned/replicated node is usually greater than any other attack detection techniques due to the similar id and features replicated by the attacker. Elliptical curve cryptography is well known for providing security in wireless networks. This paper explores a property of the ECC that is designed into a full pledged IECC protocol for keeping away replicated nodes from attacking the WSNs and MWSNs. In terms of application, the focus is to secure an industrial area using the IECC mechanism for efficient remote monitoring. Simulation analysis shows that the IECC performs well in static WSN and MWSNs over the existing baseline protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE 26th international conference on computer communications (pp. 2045–2053). He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE 26th international conference on computer communications (pp. 2045–2053).
2.
go back to reference Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49–63). Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49–63).
3.
go back to reference Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022–1034.CrossRef Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022–1034.CrossRef
4.
go back to reference Li, Y., Thai, M. T., & Wu, W. (2008). Wireless sensor networks and applications. New York, NY: Springer.CrossRef Li, Y., Thai, M. T., & Wu, W. (2008). Wireless sensor networks and applications. New York, NY: Springer.CrossRef
5.
go back to reference Ngai, E. C., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. IEEE International Conference on Communications, 8, 3383–3389. Ngai, E. C., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. IEEE International Conference on Communications, 8, 3383–3389.
6.
go back to reference Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In IEEE international conference on networking and communications, wireless and mobile computing (pp. 526–531). Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In IEEE international conference on networking and communications, wireless and mobile computing (pp. 526–531).
7.
go back to reference Pathan, A. S. K. (2010). Security of self-organizing networks: MANET, WSN, WMN. VANET: CRC Press.CrossRef Pathan, A. S. K. (2010). Security of self-organizing networks: MANET, WSN, WMN. VANET: CRC Press.CrossRef
8.
go back to reference Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials, 11(4), 42–56.CrossRef Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials, 11(4), 42–56.CrossRef
9.
go back to reference Da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 16–23). Da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 16–23).
10.
go back to reference Renold, A. P., Poongothai, R., & Parthasarathy, R. (2012). Performance analysis of LEACH with gray hole attack in wireless sensor networks. In International conference on computer communication and informatics (pp. 1–4). Renold, A. P., Poongothai, R., & Parthasarathy, R. (2012). Performance analysis of LEACH with gray hole attack in wireless sensor networks. In International conference on computer communication and informatics (pp. 1–4).
11.
go back to reference Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In IEEE international conference on wireless communications, networking and mobile computing (pp. 2684–2687). Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In IEEE international conference on wireless communications, networking and mobile computing (pp. 2684–2687).
12.
go back to reference Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In IEEE 8th international conference advanced communication technology, (Vol. 2, pp. 6–). Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In IEEE 8th international conference advanced communication technology, (Vol. 2, pp. 6–).
13.
go back to reference Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering, no. 9. WSEAS. Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering, no. 9. WSEAS.
14.
go back to reference Avancha, S., Under Coffer, J., Joshi, A., & Pinkston, J. (2004). Security for wireless sensor networks. In Wireless sensor networks, (pp. 253–275). Berlin: Springer. Avancha, S., Under Coffer, J., Joshi, A., & Pinkston, J. (2004). Security for wireless sensor networks. In Wireless sensor networks, (pp. 253–275). Berlin: Springer.
15.
go back to reference Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre distribution. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 37(6), 1246–1258.CrossRef Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre distribution. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 37(6), 1246–1258.CrossRef
16.
go back to reference Sujihelen, L., Jayakumar, C., & Senthil Singh, C. (2015). Detecting node replication attacks in wireless sensor networks: Survey. Indian Journal of Science and Technology, 8(16). Sujihelen, L., Jayakumar, C., & Senthil Singh, C. (2015). Detecting node replication attacks in wireless sensor networks: Survey. Indian Journal of Science and Technology, 8(16).
17.
go back to reference Manjula, V., & Chellappan, C. (2011). The replication attack in wireless sensor networks: Analysis and defenses. In Advances in networks and communications (pp. 169–178). Berlin: Springer. Manjula, V., & Chellappan, C. (2011). The replication attack in wireless sensor networks: Analysis and defenses. In Advances in networks and communications (pp. 169–178). Berlin: Springer.
18.
go back to reference Gracanin, D., Adams, K. P., & Eltoweissy, M. (2006). Data replication in collaborative sensor network systems. In 25th IEEE international conference on performance, computing, and communications. Gracanin, D., Adams, K. P., & Eltoweissy, M. (2006). Data replication in collaborative sensor network systems. In 25th IEEE international conference on performance, computing, and communications.
19.
go back to reference Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. In IEEE third international conference on security and privacy in communications networks secure communication (pp. 341–350). Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. In IEEE third international conference on security and privacy in communications networks secure communication (pp. 341–350).
20.
go back to reference Yu, C. M., Lu, C. S., & Kuo, S. Y. (2012). CSI: Compressed sensing-based clone identification in sensor networks. In IEEE international conference on pervasive computing and communications (pp. 290–295). Yu, C. M., Lu, C. S., & Kuo, S. Y. (2012). CSI: Compressed sensing-based clone identification in sensor networks. In IEEE international conference on pervasive computing and communications (pp. 290–295).
21.
go back to reference Xing, K., Liu, F., Cheng, X., & Du, D. H. (2008). Real-time detection of clone attacks in wireless sensor networks. In IEEE 28th international conference on distributed computing systems (pp. 3–10). Xing, K., Liu, F., Cheng, X., & Du, D. H. (2008). Real-time detection of clone attacks in wireless sensor networks. In IEEE 28th international conference on distributed computing systems (pp. 3–10).
22.
go back to reference Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. Journal of Networks, 9(6), 1471–1476.CrossRef Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. Journal of Networks, 9(6), 1471–1476.CrossRef
23.
go back to reference Rama, A., & Masthan, M. (2014). Quick detection involving cellular duplicate node assaults in cellular sensor networks using SPRT. Middle-East Journal of Scientific Research, 20(4), 522–526. Rama, A., & Masthan, M. (2014). Quick detection involving cellular duplicate node assaults in cellular sensor networks using SPRT. Middle-East Journal of Scientific Research, 20(4), 522–526.
24.
go back to reference Shaukat, H. R., Hashim, F., & Sali, A. (2014). Danger theory based node replication attacks detection in mobile wireless sensor network. In IEEE symposium on computer applications and industrial electronics (pp. 18–23). Shaukat, H. R., Hashim, F., & Sali, A. (2014). Danger theory based node replication attacks detection in mobile wireless sensor network. In IEEE symposium on computer applications and industrial electronics (pp. 18–23).
25.
go back to reference Mishra, B., & Singh, Y. (2015). An approach toward the optimization of witness based node clone attack. In IEEE 3rd international conference on image information processing (pp. 506–510). Mishra, B., & Singh, Y. (2015). An approach toward the optimization of witness based node clone attack. In IEEE 3rd international conference on image information processing (pp. 506–510).
26.
go back to reference Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Shen, X. (2013). ERCD: An energy-efficient clone detection protocol in WSNs. In IEEE conference on computer communications (pp. 2436–2444). Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Shen, X. (2013). ERCD: An energy-efficient clone detection protocol in WSNs. In IEEE conference on computer communications (pp. 2436–2444).
27.
go back to reference Conti, M. Di, Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5), 685–698.CrossRef Conti, M. Di, Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5), 685–698.CrossRef
28.
go back to reference Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476–1488.CrossRef Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476–1488.CrossRef
29.
go back to reference Singh, M. M., Singh, A., & Mandal, J. K. (2014). Preventing node replication attack in static Wireless Sensor Networks. In 3rd international conference on reliability, infocom technologies and optimization (pp. 1–5). Singh, M. M., Singh, A., & Mandal, J. K. (2014). Preventing node replication attack in static Wireless Sensor Networks. In 3rd international conference on reliability, infocom technologies and optimization (pp. 1–5).
31.
go back to reference Mohan, S., & Rinsa, E. A. Mobile replica node detection & rejection in WSN using SPRT. Mohan, S., & Rinsa, E. A. Mobile replica node detection & rejection in WSN using SPRT.
32.
go back to reference Sedjelmaci, H., & Senouci, S. M. (2014). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636–3641). Sedjelmaci, H., & Senouci, S. M. (2014). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636–3641).
Metadata
Title
Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations
Authors
L. Sujihelen
C. Jayakumar
Publication date
03-01-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5157-4

Other articles of this Issue 2/2018

Wireless Personal Communications 2/2018 Go to the issue