Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design and develop security measures to protect information from various security risks and threats. Wireless Sensor Networks (WSNs) hold significant importance in this era of the technological world; as its wide range of applications are being used around the globe in almost every domain. WSNs are being deployed with several constraints and limitations, due to which deploying security mechanisms on such networks becomes a difficult task for the developers. This research work specifically targeted security issues in WSNs and hence subjected to provide authentication and data encryption in a novel manner for node-to-node communication. The proposed scheme not only provides security for the node to node communication network but also hoards memory space on nodes with the help of Elliptic Curve Digital Signature (ECDSA) cryptographic scheme to provide an appropriate mechanism for measuring key generation time, count of hello message and packet size. Furthermore, the Algorithm for Wireless Secure Communication (ASCW) also provides key management with acceptable key length. In addition to this, ASCW helps in securing the communication on node level which helps in securing the whole network in a better and efficient manner. ASCW also reduces the cost of risk and security threats on the network with the help of authentication mechanism. A physical testbed has designed based on devices and sensor motes according to the required specifications. The proposed solutions have evaluated in terms of key generation time, several hello message and size of data packets. Experimental results have indicated that ASCW is one of the suitable and a novel approach for securing data on nodes during communication in WSNs.

[1]  A. Senthilkumar,et al.  Cryptography based secure multipath routing protocols in wireless sensor network: A survey , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[2]  Athanasios V. Vasilakos,et al.  On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC , 2018, Int. J. Commun. Syst..

[3]  Halil Yetgin,et al.  A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks , 2017, IEEE Communications Surveys & Tutorials.

[4]  Rohit Vaid,et al.  Analysis of Existing Protocols in WSN Based on Key Parameters , 2018, Proceedings of 2nd International Conference on Communication, Computing and Networking.

[5]  V. Nandalal,et al.  An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN) , 2020 .

[6]  Nadra Guizani,et al.  Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.

[7]  Halizah Basiron,et al.  A Review on Security Challenges and Features in Wireless Sensor Networks: IoT Perspective , 2018 .

[8]  Abdul Hanan Abdullah,et al.  Adaptation of wireless sensor network in industries and their architecture, standards and applications , 2014 .

[9]  Saru Kumari,et al.  Provably secure biometric based authentication and key agreement protocol for wireless sensor networks , 2017, Journal of Ambient Intelligence and Humanized Computing.

[10]  Hwajeong Seo Compact Software Implementation of Public-Key Cryptography on MSP430X , 2018, TECS.

[11]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[12]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[13]  Satish Chand,et al.  Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2019, J. Ambient Intell. Humaniz. Comput..

[14]  Abdul Hanan Abdullah,et al.  Channel quality and utilization metric for interference estimation in Wireless Mesh Networks , 2017, Comput. Electr. Eng..

[15]  Wei-hong Wang,et al.  Design and implementation of an ECDSA-based identity authentication protocol on WSN , 2009, 2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.

[16]  Muli Ben-Yehuda,et al.  Ginseng: market-driven memory allocation , 2014, VEE '14.

[17]  Roger Wattenhofer,et al.  YETI: an Eclipse plug-in for TinyOS 2.1 , 2009, SenSys '09.

[18]  Imran Ghani,et al.  An algorithm for detecting SQL injection vulnerability using black-box testing , 2020, J. Ambient Intell. Humaniz. Comput..

[19]  Monali V. Rajput,et al.  Security Challenges in Wireless Sensor Networks , 2017 .

[20]  Jing Li,et al.  A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing , 2019, IEEE Access.

[21]  Amine Kardi,et al.  Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks , 2018, 2018 21st Saudi Computer Society National Computer Conference (NCC).

[22]  Xiong Li,et al.  A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems , 2020, IEEE Systems Journal.

[23]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[24]  Junyu Lai,et al.  A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs , 2019, ACM Trans. Sens. Networks.

[25]  Debiao He,et al.  New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment , 2018, Secur. Commun. Networks.

[26]  Nistala V. E. S. Murthy,et al.  Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks , 2018, Int. J. Commun. Syst..

[27]  Ali Kadhum Idrees,et al.  Secret key generation in wireless sensor network using public key encryption , 2019, ICICT '19.

[28]  Philip Levis,et al.  The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.

[29]  Tong Li,et al.  Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT , 2018, Wirel. Commun. Mob. Comput..

[30]  Kashif Naseer Qureshi,et al.  Link quality and energy utilization based preferable next hop selection routing for wireless body area networks , 2020, Comput. Commun..

[31]  Jan Willemson,et al.  Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[32]  B. Karthikeyan,et al.  Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES] , 2018 .

[33]  Abdul Hanan Abdullah,et al.  Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks , 2018, Int. J. Commun. Syst..

[34]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[35]  Qing Chang,et al.  A node authentication protocol based on ECC in WSN , 2010, 2010 International Conference On Computer Design and Applications.

[36]  A. Pravin Renold,et al.  An enhanced elliptic curve algorithm for secured data transmission in wireless sensor network , 2015, 2015 Global Conference on Communication Technologies (GCCT).

[37]  Song Ju,et al.  A lightweight key establishment in wireless sensor network based on elliptic curve cryptography , 2012, 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment.

[38]  Abdul Hanan Abdullah,et al.  Provision of Security in Vehicular Ad Hoc Networks through an Intelligent Secure Routing Scheme , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).

[39]  Seog Chung Seo,et al.  A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks , 2006, EUC Workshops.

[40]  Hong Xu,et al.  A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography , 2018, Sensors.

[41]  Anthony T. Chronopoulos,et al.  An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs) , 2018 .

[42]  Kai Xu,et al.  A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..

[43]  Abdul Hanan Abdullah,et al.  Soft-GORA: Soft Constrained Globally Optimal Resource Allocation for Critical Links in IoT Backhaul Communication , 2018, IEEE Access.

[44]  Seungjo Bae,et al.  Design of Network Management Platform and Security Framework for WSN , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.

[45]  Parli B. Hari,et al.  Security issues in Wireless Sensor Networks: Current research and challenges , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[46]  Hesham Arafat,et al.  Security and Key Management Challenges Over WSN (a Survey) , 2019 .

[47]  Rawya Y. Rizk,et al.  A new security protocol using hybrid cryptography algorithms , 2013, 2013 9th International Computer Engineering Conference (ICENCO).

[48]  Mohammad S. Obaidat,et al.  A robust mutual authentication protocol for WSN with multiple base-stations , 2018, Ad Hoc Networks.