Abstract
Wireless sensor networks are the most vulnerable to all the wireless devices due to the massive damage caused by disrupting these networks. A good number of attacks have been launched in the wireless networks which are prevalent in the antagonist world. However, the most difficult of all the attacks is the identification and prevention of the replication of nodes. The time it takes to identify and isolate a cloned/replicated node is usually greater than any other attack detection techniques due to the similar id and features replicated by the attacker. Elliptical curve cryptography is well known for providing security in wireless networks. This paper explores a property of the ECC that is designed into a full pledged IECC protocol for keeping away replicated nodes from attacking the WSNs and MWSNs. In terms of application, the focus is to secure an industrial area using the IECC mechanism for efficient remote monitoring. Simulation analysis shows that the IECC performs well in static WSN and MWSNs over the existing baseline protocols.
Similar content being viewed by others
References
He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE 26th international conference on computer communications (pp. 2045–2053).
Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49–63).
Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022–1034.
Li, Y., Thai, M. T., & Wu, W. (2008). Wireless sensor networks and applications. New York, NY: Springer.
Ngai, E. C., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. IEEE International Conference on Communications, 8, 3383–3389.
Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In IEEE international conference on networking and communications, wireless and mobile computing (pp. 526–531).
Pathan, A. S. K. (2010). Security of self-organizing networks: MANET, WSN, WMN. VANET: CRC Press.
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials, 11(4), 42–56.
Da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 16–23).
Renold, A. P., Poongothai, R., & Parthasarathy, R. (2012). Performance analysis of LEACH with gray hole attack in wireless sensor networks. In International conference on computer communication and informatics (pp. 1–4).
Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In IEEE international conference on wireless communications, networking and mobile computing (pp. 2684–2687).
Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In IEEE 8th international conference advanced communication technology, (Vol. 2, pp. 6–).
Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering, no. 9. WSEAS.
Avancha, S., Under Coffer, J., Joshi, A., & Pinkston, J. (2004). Security for wireless sensor networks. In Wireless sensor networks, (pp. 253–275). Berlin: Springer.
Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre distribution. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 37(6), 1246–1258.
Sujihelen, L., Jayakumar, C., & Senthil Singh, C. (2015). Detecting node replication attacks in wireless sensor networks: Survey. Indian Journal of Science and Technology, 8(16).
Manjula, V., & Chellappan, C. (2011). The replication attack in wireless sensor networks: Analysis and defenses. In Advances in networks and communications (pp. 169–178). Berlin: Springer.
Gracanin, D., Adams, K. P., & Eltoweissy, M. (2006). Data replication in collaborative sensor network systems. In 25th IEEE international conference on performance, computing, and communications.
Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. In IEEE third international conference on security and privacy in communications networks secure communication (pp. 341–350).
Yu, C. M., Lu, C. S., & Kuo, S. Y. (2012). CSI: Compressed sensing-based clone identification in sensor networks. In IEEE international conference on pervasive computing and communications (pp. 290–295).
Xing, K., Liu, F., Cheng, X., & Du, D. H. (2008). Real-time detection of clone attacks in wireless sensor networks. In IEEE 28th international conference on distributed computing systems (pp. 3–10).
Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. Journal of Networks, 9(6), 1471–1476.
Rama, A., & Masthan, M. (2014). Quick detection involving cellular duplicate node assaults in cellular sensor networks using SPRT. Middle-East Journal of Scientific Research, 20(4), 522–526.
Shaukat, H. R., Hashim, F., & Sali, A. (2014). Danger theory based node replication attacks detection in mobile wireless sensor network. In IEEE symposium on computer applications and industrial electronics (pp. 18–23).
Mishra, B., & Singh, Y. (2015). An approach toward the optimization of witness based node clone attack. In IEEE 3rd international conference on image information processing (pp. 506–510).
Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Shen, X. (2013). ERCD: An energy-efficient clone detection protocol in WSNs. In IEEE conference on computer communications (pp. 2436–2444).
Conti, M. Di, Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5), 685–698.
Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476–1488.
Singh, M. M., Singh, A., & Mandal, J. K. (2014). Preventing node replication attack in static Wireless Sensor Networks. In 3rd international conference on reliability, infocom technologies and optimization (pp. 1–5).
Wald, A. (1945). Sequential tests of statistical hypotheses. The Annals of Mathematical Statistics, 16, 117–186.
Mohan, S., & Rinsa, E. A. Mobile replica node detection & rejection in WSN using SPRT.
Sedjelmaci, H., & Senouci, S. M. (2014). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636–3641).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sujihelen, L., Jayakumar, C. Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations. Wireless Pers Commun 99, 893–914 (2018). https://doi.org/10.1007/s11277-017-5157-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-5157-4