An Empirical study of Elliptic Curve Cryptography for the Resource Constrained Wireless Sensor Network

Author(s):  
PritamGajkumar Shah
2020 ◽  
Vol 8 (5) ◽  
pp. 5560-5563

Wireless Sensor Network (WSN) extends the advantages of small price, quick employment, and shared transaction medium, although it induces a lot of security and secrecy challenges. In this paper, the Elliptic Curve Cryptography based Secure Data Communication and Enhance sensor Reliability (SDER) in WSN. In this scheme, an Elliptic Curve Cryptography (ECC) Weierstrass function is used to verify the sensor reliability, and ECC cryptography technique is useful for providing the data security in the network. The simulation result demonstrates that the SDER reduces both the packet loss rate and the network delay.


Author(s):  
Md Sirajul Huque ◽  
Sk. Bhadar Saheb ◽  
Jayaram Boga

Wireless sensor networks (WSN) are a collection of autonomous collection of motes. Sensor motes are usually Low computational and low powered. In WSN Sensor motes are used to collect environmental data collection and pass that data to the base station. Data aggregation is a common technique widely used in wireless sensor networks. [2] Data aggregation is the process of collecting the data from multiple sensor nodes by avoiding the redundant data transmission and that collected data has been sent to the base station (BS) in single route. Secured data aggregation deals with Securing aggregated data collected from various sources. Many secured data aggregation algorithms has been proposed by many researchers. Symmetric key based cryptography schemes are not suitable when wireless sensor network grows. Here we are proposing an approach to secured data aggregation in wireless sensor networks using Asymmetric key based Elliptic Curve cryptography technique. Elliptic curve cryptography (ECC) [1] is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Elliptic Curve Cryptography requires smaller keys compared to non-Elliptic curve cryptography (based on plain Galois fields) to provide equivalent security. The proposed technique of secure data aggregation is used to improve the sensor network lifetime and to reduce the energy consumption during aggregation process.


2013 ◽  
Vol 433-435 ◽  
pp. 229-232
Author(s):  
Xiao Guang Yuan ◽  
Dong Zhu Feng ◽  
Jian Deng ◽  
Yuan Jie Bai

In order to solve the decision information fusion issues of resource-constrained wireless sensor network, several decision information fusion rules under exponential distribution fading channel are investigated in this paper. At first, optimal likelihood ratio rule is given. The detection performance of this fusion rule is best, however, this rule acquires channel information which is too costly for resource constrained sensor networks. To solve this problem, suboptimal likelihood ratio fusion rule is proposed which requires only the knowledge of channel statistics. In addition, the reduced forms of the suboptimal are also derived, in the case of extreme channel signal-to-noise ratio (SNR). Theoretical analysis and simulations show that suboptimal fusion rule needs much less computation and information, yet exhibits only slight performance degradation. Suboptimal fusion rules are practicable for resource constrained wireless sensor networks decision information fusion system working in ocean environment.


Sign in / Sign up

Export Citation Format

Share Document