A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks (original) (raw)

SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS

IJRCAR, 2015

Message Authentication scheme have been proposed in the past for protecting communication Authenticity and integrity in Wireless Sensor Networks (WSNs). For this reason, many Message Authentication schemes have been developed, based on either Symmetric-Key Cryptosystems or Public-Key Cryptosystems. While Symmetric Key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may create large memory and communication overhead. On the contrary, Public Key based Schemes have simple and clean key management. Most of them however have following limitations: Computation and Communication overhead, no resilience to a large number of node compromises, lack of scalability. To solve this problem, a secret Polynomial based Message Authentication scheme was introduced. This scheme is similar to a threshold secret sharing, where the threshold value is determined by the Degree of the Polynomial. When the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial and the system is completely broken. In this paper, we propose a Novel and efficient Source Anonymous Message Authentication scheme based on ECC to provide message content authenticity. To provide hop by hop message authentication without the weakness of the built in threshold of the polynomial based scheme. The main challenges is that authenticity must be guaranteed even when only the sender of the data is trusted and scheme needs to scale to potentially millions of receivers. Proposed scheme is more efficient than the polynomial-based scheme in terms of computational overhead, delivery ratio and message delay

Efficient Message Authentication and Source Privacy in Wireless Sensor Networks

Abstract: Message authentication is used to prevent the unauthorized messages forwarded in the Wireless Sensor Networks (WNS). The main aim of this project is to prevent unauthorized and corrupted message by allowing intermediate efficient node authentication. Many authentication schemes have been proposed to provide message authenticity; these schemes can be either public-key based approaches or symmetric-key based approaches. Scalable authentication scheme based on Elliptic Curve Cryptography (ECC) enables the intermediate node to authenticate the message and provide Hop by Hop message authentication. Route request is encrypted for authentication of messages with source privacy. An efficient key management framework is proposed to ensure isolation of the compromised node. The compromised node will be identified and alert information sends to all nodes. Keywords: Wireless Sensor networks, Message authentication, Source privacy, Symmetric key cryptosystem, compromised node. Title: Efficient Message Authentication and Source Privacy in Wireless Sensor Networks Author: A. Arul packiaraj, M. Merlin Moses International Journal of Computer Science and Information Technology Research ISSN 2348-1196 (print), ISSN 2348-120X (online) Research Publish Journals

An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks

IEEE Access

The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span of WSNs is the clustering of Wireless Sensors (WS), which reduces the workload of WS and thereby reduces its power consumption. However, a drastic reduction in the power consumption of the sensors when multicore sensors are used in combination with sensors clustering has not been well explored. Therefore, this work proposes a WSN model that employs clustering of multicore WS. The existing Elliptic Curve Cryptographic (ECC) algorithm is optimized for parallel execution of the encryption/decryption processes and security against primitive attacks. The Elliptic Curve Diffie-Helman (ECDH) was used for the key exchange algorithm, and the Elliptic Curve Digital Signature Algorithm (ECDSA) was used to authenticate the communicating nodes. Security analysis of the model and comparative performance analysis with the existing ones were demonstrated. The security analysis results reveal that the proposed model meets the security requirements and resists various security attacks. Additionally, the projected model is scalable, energy-conservative, and supports data freshness. The results of comparative performance analysis show that the proposed WSN model can efficiently leverage multiprocessors and/or many cores for quicker execution and conserves power usage.

An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)

Mathematical and Computational Applications, 2018

In wireless sensor networks (WSNs), users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network) of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC) to accelerate authentication of multiuser message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network

2012

This paper discusses different issues of Wireless S ensor Network (WS N) and the relevance of the Elliptic curve y cryptography. S ecurity in WS N is a greater challenge in WS N due to the processing limitations of sensor nodes and nature of wireless links. Extensive use of WS Ns is giving rise to different types of threats. To defend against the threats proper security schemes are required. Traditionally security is implemented through hardware or software and is generally achieved through cryptographic methods. Limited area, nature of links, limited processing, power and memory of WS Ns leads to strict constraints on the selection of cryptographic techniques. Elliptic Curve Cryptography (ECC) is the best candidate due to its smaller key size. High security despite of smaller key size results in area and power efficient crypto systems.

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

Journal of Ambient Intelligence and Humanized Computing, 2020

Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In today's world of modern technology, there is a need to design and develop security measures to protect information from various security risks and threats. Wireless Sensor Networks (WSNs) hold significant importance in this era of the technological world; as its wide range of applications are being used around the globe in almost every domain. WSNs are being deployed with several constraints and limitations, due to which deploying security mechanisms on such networks becomes a difficult task for the developers. This research work specifically targeted security issues in WSNs and hence subjected to provide authentication and data encryption in a novel manner for node-to-node communication. The proposed scheme not only provides security for the node to node communication network but also hoards memory space on nodes with the help of Elliptic Curve Digital Signature (ECDSA) cryptographic scheme to provide an appropriate mechanism for measuring key generation time, count of hello message and packet size. Furthermore, the Algorithm for Wireless Secure Communication (ASCW) also provides key management with acceptable key length. In addition to this, ASCW helps in securing the communication on node level which helps in securing the whole network in a better and efficient manner. ASCW also reduces the cost of risk and security threats on the network with the help of authentication mechanism. A physical testbed has designed based on devices and sensor motes according to the required specifications. The proposed solutions have evaluated in terms of key generation time, several hello message and size of data packets. Experimental results have indicated that ASCW is one of the suitable and a novel approach for securing data on nodes during communication in WSNs.

A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption

International Journal of Computer Networks & Communications

With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.

A Brief Analysis on Key Management Schemes using Elliptic Curve Cryptography in Wireless Sensor Network

The goal of this paper is to analyse efficient encryption schemes in wireless sensor networks and in devices with low computing power and resources. Embedded devices are also being used for information transfer and hence the need of network security is arising for these domain specific systems. Elliptic Curve Cryptography (ECC) has emerged as the most trusted solution for providing security on such systems. As these systems are classified to be resource constrained, the small key size of ECC makes it effective to implement on such systems. The good thing about ECC is that it can be faster than RSA and uses smaller keys, but still provides the same level of security. The security of ECC relies on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP). A comparative study of ECC with RSA is made in terms of key size, computational power and other factors.

Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange

2010 Fourth International Conference on Network and System Security, 2010

Today's security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, in order to save pre-computing there is a trend for sensor networks to design a sensor-group-leader rather than every sensor node communicates to the end database, which indicated the needs to prevent from the man-in-the middle attacking. In this paper we first present an algorithm that we called "hidden generation point" ECC protocol to protecting the ECC key exchange system from the man-in-middle attacking in wireless sensor networks. Even though there are other ways to be investigated, which will published in other paper, the major contribution in this paper is showing the hidden generation point" works. Also it is noted that the agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. A multi-agent applying for key exchange is motioned even the further discussed will be presented in another paper as the major task of this paper is presenting "hidden generation point." Keywords-elliptic curve crytographic; public key; hiden generator point; man-in-middle attack.

IJERT-Message Authentication And Source Privacy using ECC in WSN

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/message-authentication-and-source-privacy-using-ecc-in-wsn https://www.ijert.org/research/message-authentication-and-source-privacy-using-ecc-in-wsn-IJERTV3IS031125.pdf In order to thwart unauthorised and corrupted messages from being forwarded in wireless sensor networks (WSN) we can make use of message authentication which is very effective way. In this regard many symmetric and public key cryptographic systems have been developed which suffered in their own limitations. Recently developed polynomial-based scheme also reported the limitation in its threshold value, as number of messages to be transferred should not cross the threshold limit. In this paper we propose a scalable authentication scheme based on Elliptic Curve Cryptography (ECC).Here our scheme enables intermediate nodes authentication and does not suffer with any threshold limit problem also provide message source privacy.