Skip to main content
Log in

Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks are the most vulnerable to all the wireless devices due to the massive damage caused by disrupting these networks. A good number of attacks have been launched in the wireless networks which are prevalent in the antagonist world. However, the most difficult of all the attacks is the identification and prevention of the replication of nodes. The time it takes to identify and isolate a cloned/replicated node is usually greater than any other attack detection techniques due to the similar id and features replicated by the attacker. Elliptical curve cryptography is well known for providing security in wireless networks. This paper explores a property of the ECC that is designed into a full pledged IECC protocol for keeping away replicated nodes from attacking the WSNs and MWSNs. In terms of application, the focus is to secure an industrial area using the IECC mechanism for efficient remote monitoring. Simulation analysis shows that the IECC performs well in static WSN and MWSNs over the existing baseline protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE 26th international conference on computer communications (pp. 2045–2053).

  2. Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49–63).

  3. Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022–1034.

    Article  Google Scholar 

  4. Li, Y., Thai, M. T., & Wu, W. (2008). Wireless sensor networks and applications. New York, NY: Springer.

    Book  Google Scholar 

  5. Ngai, E. C., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. IEEE International Conference on Communications, 8, 3383–3389.

    Google Scholar 

  6. Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In IEEE international conference on networking and communications, wireless and mobile computing (pp. 526–531).

  7. Pathan, A. S. K. (2010). Security of self-organizing networks: MANET, WSN, WMN. VANET: CRC Press.

    Book  Google Scholar 

  8. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials, 11(4), 42–56.

    Article  Google Scholar 

  9. Da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 16–23).

  10. Renold, A. P., Poongothai, R., & Parthasarathy, R. (2012). Performance analysis of LEACH with gray hole attack in wireless sensor networks. In International conference on computer communication and informatics (pp. 1–4).

  11. Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In IEEE international conference on wireless communications, networking and mobile computing (pp. 2684–2687).

  12. Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In IEEE 8th international conference advanced communication technology, (Vol. 2, pp. 6–).

  13. Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering, no. 9. WSEAS.

  14. Avancha, S., Under Coffer, J., Joshi, A., & Pinkston, J. (2004). Security for wireless sensor networks. In Wireless sensor networks, (pp. 253–275). Berlin: Springer.

  15. Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre distribution. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 37(6), 1246–1258.

    Article  Google Scholar 

  16. Sujihelen, L., Jayakumar, C., & Senthil Singh, C. (2015). Detecting node replication attacks in wireless sensor networks: Survey. Indian Journal of Science and Technology, 8(16).

  17. Manjula, V., & Chellappan, C. (2011). The replication attack in wireless sensor networks: Analysis and defenses. In Advances in networks and communications (pp. 169–178). Berlin: Springer.

  18. Gracanin, D., Adams, K. P., & Eltoweissy, M. (2006). Data replication in collaborative sensor network systems. In 25th IEEE international conference on performance, computing, and communications.

  19. Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. In IEEE third international conference on security and privacy in communications networks secure communication (pp. 341–350).

  20. Yu, C. M., Lu, C. S., & Kuo, S. Y. (2012). CSI: Compressed sensing-based clone identification in sensor networks. In IEEE international conference on pervasive computing and communications (pp. 290–295).

  21. Xing, K., Liu, F., Cheng, X., & Du, D. H. (2008). Real-time detection of clone attacks in wireless sensor networks. In IEEE 28th international conference on distributed computing systems (pp. 3–10).

  22. Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. Journal of Networks, 9(6), 1471–1476.

    Article  Google Scholar 

  23. Rama, A., & Masthan, M. (2014). Quick detection involving cellular duplicate node assaults in cellular sensor networks using SPRT. Middle-East Journal of Scientific Research, 20(4), 522–526.

    Google Scholar 

  24. Shaukat, H. R., Hashim, F., & Sali, A. (2014). Danger theory based node replication attacks detection in mobile wireless sensor network. In IEEE symposium on computer applications and industrial electronics (pp. 18–23).

  25. Mishra, B., & Singh, Y. (2015). An approach toward the optimization of witness based node clone attack. In IEEE 3rd international conference on image information processing (pp. 506–510).

  26. Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Shen, X. (2013). ERCD: An energy-efficient clone detection protocol in WSNs. In IEEE conference on computer communications (pp. 2436–2444).

  27. Conti, M. Di, Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5), 685–698.

    Article  Google Scholar 

  28. Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7(8), 1476–1488.

    Article  Google Scholar 

  29. Singh, M. M., Singh, A., & Mandal, J. K. (2014). Preventing node replication attack in static Wireless Sensor Networks. In 3rd international conference on reliability, infocom technologies and optimization (pp. 1–5).

  30. Wald, A. (1945). Sequential tests of statistical hypotheses. The Annals of Mathematical Statistics, 16, 117–186.

    Article  MathSciNet  MATH  Google Scholar 

  31. Mohan, S., & Rinsa, E. A. Mobile replica node detection & rejection in WSN using SPRT.

  32. Sedjelmaci, H., & Senouci, S. M. (2014). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636–3641).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Sujihelen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sujihelen, L., Jayakumar, C. Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations. Wireless Pers Commun 99, 893–914 (2018). https://doi.org/10.1007/s11277-017-5157-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5157-4

Keywords

Navigation