Data Protection Using Hierarchical and Dynamic Elliptic Curve Cryptosystem in Wireless Sensor Network

نویسندگان

  • O. Sheela
  • T. Samraj Lawrence
  • D. C. Joy
  • Winnie Wise
چکیده

In Wireless Sensor Networks (WSN), because of the absence of physical protection, the wireless connections are prone to different type of attacks. Therefore, security is a measure concern in WSN. Hence to provide security, Hierarchical and Dynamic Elliptic curve cryptosystem (HiDE) scheme is proposed. To serve a large amount of sensors, HiDE provides a hierarchical cluster-based framework consisting of a Backbone Network and several Area Clusters. Many Gateways connected together to form a Backbone Network. Sensor Nodes in the WSN are group together based on area to form an Area Cluster (AC). Area Cluster consists of Cluster Head (CH), Sensor Nodes and the Gateway. For energy efficient data transmission, Low Energy Adaptive Clustering Hierarchy (LEACH) is used to select the Cluster Head dynamically. The Cluster Head collects the data from the Source Node and transmit it to the Destination through the Gateway (GW) in the Backbone Network. However, limited by the coverage of Gateway, Source Gateway may not be directly linked with the Destination Gateway in a single hop, so needs to hop through other Gateways to reach the Destination Area Cluster. Data encryption using Elliptic Curve Cryptography (ECC) provides high security with small key size than RSA. Key management includes key computation, key exchanges, and data encryption and decryption. Cluster-based cryptographic mechanism provides efficient energy utilization of sensor nodes along with security and low message overhead. Thus, HiDE can protect the confidentiality of sensitive data with low computation overhead, and keep appropriate network performance for Wireless Sensor Network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem

In Wireless Sensor Networks (WSN), the wireless connections are prone to different type of attacks. Therefore, security of the data that transfer over the wireless network is a measure concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an important factor. Hence to provide security along with efficient energy utilization of sensor nodes, Secure and Ener...

متن کامل

Energy Efficient Secure Data Aggregation in Wireless Sensor Networks

Secure data aggregation in wireless sensor networks has two main objectives which are contrasting in nature. i) Efficiently collecting and aggregating data ii) Aggregating the data securely. Many schemes do not take into account the passive adversary and allow the aggregator to decrypt data which certainly is not secure; on the other hand using public key cryptography for end to end security is...

متن کامل

Providing Security for Multipath Routing Protocol in Wireless Sensor Networks

Wireless Sensor Network (WSN) is a combined group of sensors form a network. WSN will monitor the changes in physical conditions and it will forward the data via multi hop network. Sensors are dynamic in nature so the lifetime of sensors and providing security for the data transmitted by the nodes are the major problems faced by the Wireless Sensor Networks (WSN). Ad hoc On-demand Multipath Dis...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015