Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations

Published: 01 March 2018 Publication History

Abstract

Wireless sensor networks are the most vulnerable to all the wireless devices due to the massive damage caused by disrupting these networks. A good number of attacks have been launched in the wireless networks which are prevalent in the antagonist world. However, the most difficult of all the attacks is the identification and prevention of the replication of nodes. The time it takes to identify and isolate a cloned/replicated node is usually greater than any other attack detection techniques due to the similar id and features replicated by the attacker. Elliptical curve cryptography is well known for providing security in wireless networks. This paper explores a property of the ECC that is designed into a full pledged IECC protocol for keeping away replicated nodes from attacking the WSNs and MWSNs. In terms of application, the focus is to secure an industrial area using the IECC mechanism for efficient remote monitoring. Simulation analysis shows that the IECC performs well in static WSN and MWSNs over the existing baseline protocols.

References

[1]
He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE 26th international conference on computer communications (pp. 2045---2053).
[2]
Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE symposium on security and privacy (pp. 49---63).
[3]
Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications,35(3), 1022---1034.
[4]
Li, Y., Thai, M. T., & Wu, W. (2008). Wireless sensor networks and applications. New York, NY: Springer.
[5]
Ngai, E. C., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. IEEE International Conference on Communications,8, 3383---3389.
[6]
Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In IEEE international conference on networking and communications, wireless and mobile computing (pp. 526---531).
[7]
Pathan, A. S. K. (2010). Security of self-organizing networks: MANET, WSN, WMN. VANET: CRC Press.
[8]
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials,11(4), 42---56.
[9]
Da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks (pp. 16---23).
[10]
Renold, A. P., Poongothai, R., & Parthasarathy, R. (2012). Performance analysis of LEACH with gray hole attack in wireless sensor networks. In International conference on computer communication and informatics (pp. 1---4).
[11]
Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In IEEE international conference on wireless communications, networking and mobile computing (pp. 2684---2687).
[12]
Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In IEEE 8th international conference advanced communication technology, (Vol. 2, pp. 6---).
[13]
Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering, no. 9. WSEAS.
[14]
Avancha, S., Under Coffer, J., Joshi, A., & Pinkston, J. (2004). Security for wireless sensor networks. In Wireless sensor networks, (pp. 253---275). Berlin: Springer.
[15]
Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key pre distribution. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews,37(6), 1246---1258.
[16]
Sujihelen, L., Jayakumar, C., & Senthil Singh, C. (2015). Detecting node replication attacks in wireless sensor networks: Survey. Indian Journal of Science and Technology, 8(16).
[17]
Manjula, V., & Chellappan, C. (2011). The replication attack in wireless sensor networks: Analysis and defenses. In Advances in networks and communications (pp. 169---178). Berlin: Springer.
[18]
Gracanin, D., Adams, K. P., & Eltoweissy, M. (2006). Data replication in collaborative sensor network systems. In 25th IEEE international conference on performance, computing, and communications.
[19]
Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. In IEEE third international conference on security and privacy in communications networks secure communication (pp. 341---350).
[20]
Yu, C. M., Lu, C. S., & Kuo, S. Y. (2012). CSI: Compressed sensing-based clone identification in sensor networks. In IEEE international conference on pervasive computing and communications (pp. 290---295).
[21]
Xing, K., Liu, F., Cheng, X., & Du, D. H. (2008). Real-time detection of clone attacks in wireless sensor networks. In IEEE 28th international conference on distributed computing systems (pp. 3---10).
[22]
Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. Journal of Networks,9(6), 1471---1476.
[23]
Rama, A., & Masthan, M. (2014). Quick detection involving cellular duplicate node assaults in cellular sensor networks using SPRT. Middle-East Journal of Scientific Research,20(4), 522---526.
[24]
Shaukat, H. R., Hashim, F., & Sali, A. (2014). Danger theory based node replication attacks detection in mobile wireless sensor network. In IEEE symposium on computer applications and industrial electronics (pp. 18---23).
[25]
Mishra, B., & Singh, Y. (2015). An approach toward the optimization of witness based node clone attack. In IEEE 3rd international conference on image information processing (pp. 506---510).
[26]
Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Shen, X. (2013). ERCD: An energy-efficient clone detection protocol in WSNs. In IEEE conference on computer communications (pp. 2436---2444).
[27]
Conti, M. Di, Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing,8(5), 685---698.
[28]
Ho, J. W., Liu, D., Wright, M., & Das, S. K. (2009). Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks,7(8), 1476---1488.
[29]
Singh, M. M., Singh, A., & Mandal, J. K. (2014). Preventing node replication attack in static Wireless Sensor Networks. In 3rd international conference on reliability, infocom technologies and optimization (pp. 1---5).
[30]
Wald, A. (1945). Sequential tests of statistical hypotheses. The Annals of Mathematical Statistics,16, 117---186.
[31]
Mohan, S., & Rinsa, E. A. Mobile replica node detection & rejection in WSN using SPRT.
[32]
Sedjelmaci, H., & Senouci, S. M. (2014). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636---3641).

Cited By

View all
  • (2023)Range free localization in WSN against wormhole attack using Farkas’ LemmaWireless Networks10.1007/s11276-023-03279-829:5(2029-2043)Online publication date: 24-Feb-2023
  • (2022)Node Replication Attack Detection in Distributed Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2022/72527912022Online publication date: 1-Jan-2022
  • (2022)Onboard Pointing Error Detection and Estimation of Observation Satellite Data Using Extended Kalman FilterComputational Intelligence and Neuroscience10.1155/2022/43408972022Online publication date: 1-Jan-2022
  • Show More Cited By
  1. Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Wireless Personal Communications: An International Journal
      Wireless Personal Communications: An International Journal  Volume 99, Issue 2
      March 2018
      495 pages

      Publisher

      Kluwer Academic Publishers

      United States

      Publication History

      Published: 01 March 2018

      Author Tags

      1. Cryptography
      2. ECC
      3. Mobile nodes
      4. Replication attacks
      5. Security
      6. Sensor networks

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Range free localization in WSN against wormhole attack using Farkas’ LemmaWireless Networks10.1007/s11276-023-03279-829:5(2029-2043)Online publication date: 24-Feb-2023
      • (2022)Node Replication Attack Detection in Distributed Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2022/72527912022Online publication date: 1-Jan-2022
      • (2022)Onboard Pointing Error Detection and Estimation of Observation Satellite Data Using Extended Kalman FilterComputational Intelligence and Neuroscience10.1155/2022/43408972022Online publication date: 1-Jan-2022
      • (2022)An optimized whale based replication node prediction in wireless sensor networkWireless Networks10.1007/s11276-022-02928-828:4(1587-1603)Online publication date: 1-May-2022
      • (2020)ECC joins first time with SC-FDMA for Mission “security”Multimedia Tools and Applications10.1007/s11042-020-08610-579:25-26(17945-17967)Online publication date: 1-Jul-2020

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media