Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange

Print
PDF
IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
© 2013 by IJCA Journal
ICIIIOES - Number 8
Year of Publication: 2013
Authors:
T. D. Ilakkiya
C. Jayakumar
T. D. Shobana

T D Ilakkiya, C Jayakumar and T D Shobana. Article: A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange. IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences ICIIIOES(8):34-38, December 2013. Full text available. BibTeX

@article{key:article,
	author = {T. D. Ilakkiya and C. Jayakumar and T. D. Shobana},
	title = {Article: A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange},
	journal = {IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences},
	year = {2013},
	volume = {ICIIIOES},
	number = {8},
	pages = {34-38},
	month = {December},
	note = {Full text available}
}

Abstract

Wireless Sensor Networks are often deployed in adverse or hostile environments so there is always a need for key management schemes for sensor nodes. The existing q-composite Random Key Predistribution (RKP) scheme is a probabilistic key management scheme where each node is preloaded with a subset of keys that are randomly selected from a pool of keys. If a pair of neighbor nodes which have at least q common keys can be used to establish a secure link between the nodes. In this paper, we enhanced the previous security analysis (i. e. , resilience against node capture) of the q-composite RKP scheme and we present a lightweight implementation of the Elliptic Curve Diffie-Hellman (ECDH) key exchange for wireless sensor nodes Elliptic Curve Diffie-Hellman (ECDH) key exchange which is feasible for resource-restricted sensor nodes. The proposed method ECDH key exchange in WSNs is offering perfect resilience to node capture, excellent scalability, and low memory as well as reducing communication over-head. ECDH is the highly computation-intensive nature of its underlying cryptographic operations, causing fast execution times and with low energy consumption. Our results show that a full ECDH key exchange between two different nodes consumes a normal energy (including radio communication), which is significantly better for high secure environment reported ECDH implementations on comparable platforms.

References

  • M. A. Simpl?cio, P. S. L. M. Barreto, C. B. Margi, and T. M. B. Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks vol. 54, no. 15, pp. 2591– 2612, 2010.
  • L. Eschenauer and V. D. Gligor, "A key-management scheme for dis-tributed sensor networks," in Proc. 2002 ACMConference on Computer and Communications Security, pp. 41–47.
  • H. Chan, A. Perrig, and D. X. Song, "Random key pre-distribution schemes for sensor networks," in Proc. 2003 IEEE Symposium on Security and Privacy, pp. 197–213.
  • S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in adhoc networks: a probabilistic approach," in Proc. 2003 IEEE International Conference on Network Protocols, pp. 326–335.
  • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway,"A survey of key management schemes in wireless sensor networks,"ComputerCommunications. ,vol. 30,no. 11-12,pp. 2314–2341, 2007.
  • P. Bose, H. Guo, E. Kranakis, A. Maheshwari, P. Morin, J. Morrison, M. H. M. Smid, and Y. Tang, "On the false-positive rate of Bloom filters," Inf. Processing Letters. , vol. 108, no. 4, pp. 210–213, 2008.
  • K. J. Christensen, A. Roginsky, and M. Jimeno, "A new analysis of the false positive rate of a Bloom filter," Inf. Processing Letters vol. 110, no. 21, pp. 944–949, 2010. [8 "Diffie- Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups," Ayan Mahalanobis, Florida, August 2005.
  • ECC over RSA for Asymmetric Encryption: A Review, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011