With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
A review of security attacks and intrusion detection schemes in wireless sens...
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
A survey on bio inspired security in wireless sensor networks
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Distributed Intrusion Detection System for Wireless Sensor Networks
This document discusses distributed intrusion detection systems for wireless sensor networks. It begins by providing background on wireless sensor networks and the security issues they face, such as denial of service attacks, routing attacks, and Sybil attacks. Traditional intrusion detection systems cannot be directly applied to wireless sensor networks due to their resource constraints. The document then examines the need for intrusion detection systems in wireless sensor networks to provide a second line of defense against attacks. It outlines features an intrusion detection system should have to be suitable for wireless sensor networks, such as being distributed, minimizing resource usage, and not trusting any single node. Finally, it categorizes different types of intrusion detection system architectures for wireless sensor networks, including stand-alone, distributed
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
This document summarizes security schemes for wireless sensor networks, including TinySec, IEEE 802.15.4, and others. It discusses the challenges of WSNs like power constraints and limited resources. It also outlines common security threats to WSNs such as denial of service attacks, attacks on information in transit, Sybil attacks, black hole/sinkhole attacks, and hello flood attacks. The document evaluates the feasibility of applying basic security schemes like cryptography and steganography to WSNs given their unique constraints and requirements.
This document discusses security issues related to wireless sensor networks. It begins with an introduction to wireless sensor networks and an overview of security challenges due to limited sensor node capabilities. It then summarizes common attacks on different layers of wireless sensor networks and discusses security objectives. The document outlines key areas of research on sensor network security including key management, secure time synchronization, and secure routing. It provides details on different key management schemes, time synchronization protocols, and discusses vulnerabilities of existing synchronization schemes to various attacks.
A review of privacy preserving techniques in wireless sensor network
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A review of privacy preserving techniques in wireless sensor network
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
Integration of security and authentication agent in ns-2 and leach protocol f...
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
This document discusses security in wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of their applications. It then describes common security threats and attacks against wireless sensor networks, categorizing them as active/passive and internal/external. Key security requirements for wireless sensor networks are also outlined, including confidentiality, integrity, availability, and data freshness. Finally, the document reviews various security mechanisms that have been proposed to defend against different attacks in wireless sensor networks, such as cryptography, trust management, and data partitioning.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
This document discusses distributed intrusion detection systems for wireless sensor networks. It begins by providing background on wireless sensor networks and the security issues they face, such as denial of service attacks, routing attacks, and Sybil attacks. Traditional intrusion detection systems cannot be directly applied to wireless sensor networks due to their resource constraints. The document then examines the need for intrusion detection systems in wireless sensor networks to provide a second line of defense against attacks. It outlines features an intrusion detection system should have to be suitable for wireless sensor networks, such as being distributed, minimizing resource usage, and not trusting any single node. Finally, it categorizes different types of intrusion detection system architectures for wireless sensor networks, including stand-alone, distributed
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
This document summarizes security schemes for wireless sensor networks, including TinySec, IEEE 802.15.4, and others. It discusses the challenges of WSNs like power constraints and limited resources. It also outlines common security threats to WSNs such as denial of service attacks, attacks on information in transit, Sybil attacks, black hole/sinkhole attacks, and hello flood attacks. The document evaluates the feasibility of applying basic security schemes like cryptography and steganography to WSNs given their unique constraints and requirements.
This document discusses security issues related to wireless sensor networks. It begins with an introduction to wireless sensor networks and an overview of security challenges due to limited sensor node capabilities. It then summarizes common attacks on different layers of wireless sensor networks and discusses security objectives. The document outlines key areas of research on sensor network security including key management, secure time synchronization, and secure routing. It provides details on different key management schemes, time synchronization protocols, and discusses vulnerabilities of existing synchronization schemes to various attacks.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
This document discusses security in wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of their applications. It then describes common security threats and attacks against wireless sensor networks, categorizing them as active/passive and internal/external. Key security requirements for wireless sensor networks are also outlined, including confidentiality, integrity, availability, and data freshness. Finally, the document reviews various security mechanisms that have been proposed to defend against different attacks in wireless sensor networks, such as cryptography, trust management, and data partitioning.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
This document summarizes security issues and challenges in wireless sensor networks (WSNs). WSNs are vulnerable to various security threats due to their wireless nature and constrained resources. The document outlines key requirements for WSN security like confidentiality, integrity, authentication, and availability. It discusses obstacles to security in WSNs like limited resources, unreliable communication, and unattended operation. Common attacks on WSNs are categorized as insider vs outsider, passive vs active, and mote-class vs laptop-class. The document provides a brief overview of security issues and threats at different layers of a WSN.
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
This document discusses providing security for data transmission in a hybrid wireless sensor network (HWSN). In an HWSN, static sensors monitor the environment and detect events, then mobile sensors are dispatched to the event locations to conduct further analysis. The document focuses on securing the data transmission between the base station and mobile sensors when an event occurs. It proposes using the Sensor Network Encryption Protocol (SNEP), one of the building blocks of the Security Protocols for Sensor Networks (SPINS), to encrypt the data and provide confidentiality, authentication, integrity and freshness during transmission. SNEP is an appropriate security mechanism for this application as it is efficient and meets the security requirements for sensor network communications.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
The document summarizes a research study on wireless sensor networks (WSNs). It discusses WSNs applications in various fields like military, environment, healthcare, homes, and traffic control. It also examines key challenges in WSNs like energy consumption, data reporting models, and security issues. Additionally, the document reviews common simulation platforms used to test WSN protocols and evaluates their features, interfaces, support, scalability and availability of WSN modules.
The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
This document presents a paired key mechanism for providing security in wireless sensor networks. It proposes using a lightweight randomized key table with keys arranged in paired columns for authentication between nodes. The key pairs remain fixed during a session. To establish a secure connection, nodes first exchange their key tables. Then one node acts as the sender/server and encrypts a key from its table to send to the receiver/client node. The client decrypts this and returns the paired key. If this matches what the sender expected, data transmission begins. The results show this method consumes less energy than existing approaches as keys are used only once from the randomized table. It provides security against passive attacks like eavesdropping and active attacks by unauthorized nodes.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
This document presents two key management schemes called IAMKeys and KEMESIS that aim to securely encrypt data transmitted in wireless body area networks (WBANs). IAMKeys allows the sender and receiver to independently generate encryption keys for each data frame without exchanging keys. It uses physiological data stored as reference frames as seeds for a pseudorandom number generator to generate encryption keys. KEMESIS is designed for securing communication between sensors in a WBAN and uses a similar approach with one encryption key. The schemes aim to achieve security while minimizing computational overhead for resource-constrained WBAN sensors.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information
technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its
restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been
widely used recently in too many applications like smart cities, industrial internet, connected cars,
connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species
and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed
due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important
information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware,
operating system of WSN, localization, synchronization, deployment, architecture, programming models,
data aggregation and dissemination, database querying, architecture, middleware, quality of service and
security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too
many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing
research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
Similar to A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURVE SIGNCRYPTION (20)
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...IJCNCJournal
Paper Title
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machine for Trust Model and Link Reliability
Authors
Shalini Sharma and Syed Zeeshan Hussain, Jamia Millia Islamia University New Delhi, India
Abstract
Cloud computing is widely used by organizations and individuals due to its flexibility and reliability. The trust model is important for cloud computing to detect malicious users and protect user privacy. The existing research faces the issues of local optima trap and overfitting problems when a training user node is idle for more time. This research proposed Weighted Coefficient Firefly Optimization Algorithm (WCFOA) with Support Vector Machine (SVM) for the trust model calculation and identifying paths with better Quality of Services (QoS). The weighted coefficient is added to the FOA model to balance the exploration and exploitation in the search of identifying optimal path based on reliability score. The WC-FOA method measures the link reliability in the model and SVM detects the malicious users in the model. The WC-FOA model selects the optimal path for transmission in terms of trust and efficient QoS parameters. The entropy measure and link reliability are provided as input to the SVM model for the detection of attacks in the network. The WCFOA-SVM model has 96% malicious user detection, whereas the Random Forest Hierarchical Ant Colony Optimization (RF-HEACO) has 92 % accuracy.
Keywords
Cloud computing, Entropy Measure, Support Vector Machine, Trust model, Weighted Coefficient Firefly Optimization Algorithm.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL: https://aircconline.com/abstract/ijcnc/v14n5/14522cnc08.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc08.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
Paper Title
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Authors
Malek M. Al-Nawashi, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein and Monther H. Al-Bsool, Al-Balqa Applied University, Jordan
Abstract
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Keywords
Cryptography, SHA-1, Message digest, Data integrity, Digital signature, National security agency
Volume URL: https://airccse.org/journal/ijc2024.html
Youtube URL : https://youtu.be/881rIf1aAPE
Abstract URL: https://aircconline.com/abstract/ijcnc/v16n3/16324cnc06.html
Pdf URL: https://aircconline.com/ijcnc/V16N3/16324cnc06.pdf
#highmobility #complexity #radar #networkanomalydetection #6G #OFDM #OTFS #signalmodeling #transmitter #framework #complexityanalysis #scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #networks #networking #journalpaper #submission #journalsubmission
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2023--1.6
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : July 13, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesIJCNCJournal
Paper Title
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Authors
Maurizio D’Arienzo1, Manfredi Napolitano1 and Simon Pietro Romano2, 1Dipartimento di Scienze Politiche Universita della Campania ”L.Vanvitelli”, Italy, 2DIETI Universita di Napoli ”Federico II”, Italy
Abstract
The Software-Defined Networking (SDN) paradigm does represent an effective approach aimed at enhancing the performance of core networks by introducing a clean separation between the routing plane and the forwarding plane. However, the centralized architecture of SDN networks raises resiliency concerns that are addressed by a class of algorithms falling under the Controller Placement Problem (CPP) umbrella term. Such algorithms seek the optimal placement of the SDN controller. In this paper, we evaluate the main CPP algorithms and provide an experimental analysis of their performance, as well as of their capability to dynamically adapt to network malfunctions and disconnections.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL: https://aircconline.com/abstract/ijcnc/v14n5/14522cnc07.html
Pdf URL:https://aircconline.com/ijcnc/V14N5/14522cnc07.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Paper Title
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Authors
Asmaa BENCHAMA and Khalid ZEBBARA, Ibn zohr University, Morocco
Abstract
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
Keywords
Network anomaly detection, Mish, CNN-BiGRU, IDS,Hogzilla dataset
Volume URL: https://airccse.org/journal/ijc2024.html
Youtube URL :https://youtu.be/qpPQiGQCN2g
Abstract URL: https://aircconline.com/abstract/ijcnc/v16n3/16324cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V16N3/16324cnc05.pdf
#highmobility #complexity #radar #networkanomalydetection #6G #OFDM #OTFS #signalmodeling #transmitter #framework #complexityanalysis #scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #networks #networking #journalpaper #submission #journalsubmission
International Journal of Computer Networks & Communications (IJCNC) ----- Sco...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : July 06, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Multi-Layer Digital Validation of Candidate Service Appointment with Digital ...IJCNCJournal
Paper Title
Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach
Authors
Saikat Bose1, Tripti Arjariya1, Anirban Goswami2, Soumit Chowdhury3, 1Bhabha University, India, 2Techno Main Salt Lake, Sec – V, India, 3Government College of Engineering & Ceramic Technology, India
Abstract
Proposed work promotes a unique data security protocol for validating candidate’s service appointment. Process initiated with concealment of private share within the first segment of each region of the e-letter at commission’s server. This is governed by hash operations determining circular orientation of private share fragments and their hosted matrix intervals. Signed e-letter downloaded at the posted place is validated through same hash operations and public share. Candidate’s on spot taken fingerprint are concealed in two segments for each region of the eletter adopting similar hiding strategies. The copyright signature of posting place is similarly shielded on fourth segment of each region using hash operations. The certified e-letter is thoroughly validated at commission’s server and signatures stored justify authenticity of appointment and proper candidature at the posting place. The superior test results from wider angles establishes the efficacy of the proposed protocol over the existing approaches.
Keywords
Dynamic Authentication, Standard-Deviation Based Encoding, Variable Encoding, Multi-Signature Hiding, Random Signature Dispersing.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL: https://aircconline.com/abstract/ijcnc/v14n5/14522cnc06.html
Pdf URL:https://aircconline.com/ijcnc/V14N5/14522cnc06.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
International Journal of Computer Networks & Communications (IJCNC) - ---- Sc...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : June 30, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
June 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Abstract: Accurate latency computation is essential for the Internet of Things (IoT) since the connected
devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not
an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while
still allowing communication with the cloud. Many applications rely on fog computing, including traffic
management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to
address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog
computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the
simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses
various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which
are essential for evaluating the performance of the ITCMS. Our system model is also compared with other
models to assess its performance. A comparison is made using two parameters, namely throughput and the
total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend
Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system
outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Exploring Deep Learning Models for Image Recognition: A Comparative Review
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURVE SIGNCRYPTION
1. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
DOI: 10.5121/ijcnc.2019.11506 93
A NOVEL SECURITY PROTOCOL FOR WIRELESS
SENSOR NETWORKS BASED ON ELLIPTIC CURVE
SIGNCRYPTION
Anuj Kumar Singh1
and B.D.K.Patro2
1
Dr. A.P.J. Abdul Kalam Technical University, Lucknow, (U.P), India
2
Rajkiya Engineering College, Kannauj, (U.P.), India
ABSTRACT
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the
security aspects of wireless sensor networks have been on priority for the researchers. Due to the
constraints of resources in wireless sensor networks, it has been always a challenge to design efficient
security protocols for wireless sensor networks. An novel elliptic curve signcryption based security
protocol for wireless sensor networks has been presented in this paper, which provides anonymity,
confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the
same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary
attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based
protocol consumes the least time in comparison to other protocols while providing the highest level of
security.
KEYWORDS
Wireless Sensor Network, Security,Protocol, Signcryption, Elliptic Curve
1. INTRODUCTION
To monitor the harsh, hostile, or unattended environments, there is a need forhaving dedicated
infrastructure which is capable of collecting the required data when needed. The Wireless Sensor
Network (WSN) composed of tiny sensors distributed spatially, is such an infrastructure which is
used to monitor and gather data about the physical situations of an environment or location. WSN
collects the data using wireless sensors also called as nodes. Generally, the sensor node comprises
of a microcontroller, analog-to-digital converter (ADC), transceiver,powersource, and
sensors.The schematic diagram of a wireless sensor node architecture has been depicted in Figure
1 (a).The role of the microcontroller is to processes the collected data and to regulate the
functions of the other elements of the sensor node. The transceiver is equipped with an antenna
and performs the functions of both the transmitter and the receiver. Two categories of memory
are used in a sensor node, the user memory which is used to store user data, and the program
memory which is used to program the device. Sensor node operates on power and thus a power
source, commonly a battery is deployed to supply power to the sensor node. Sensor nodes are also
equipped with sensors, which are hardware devices capable of measuring the change in the
physical conditions of surroundings like temperature, pressure, etc. ADC is deployed to convert
analog values to the digital signals.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
94
The architecture of a WSN typically consists of three components - a gateway, sensor nodes, and
the user [1]. The sensor nodes and gateway are connected through wireless links, and the data
among them is passed using radio signals. Gateway also known as a sink, gathers all the data and
transmits this data to the user through the Internet or a network. The basic architecture of a WSN
has been demonstrated in Figure 1(b). Except for the gateway and the sensor node, the user is
another party involved in the communication. The communication between the gateway and the
sensor node is highly insecure because of the usage of wireless links. Due to the capability of
monitoring, sensing, and controlling, WSNs are being applied in the areas including
environmental monitoring, medical, military, healthcare, industry, robotics and many more.
Furthermore, with the evolution of the Internet of Things (IoT), application of wireless sensors
have grown to a large scale, since wireless sensors are an important component of IoT
Figure 1(a). Sensor Node Architecture Figure 1(b). Architecture of a WSN
1.1. Security Requirements of WSN
Besides confidentiality, non-repudiation, authentication, and integrity, which are the major
security features for any system, WSNs require the implementation of some more security
attributes, since they function in the wireless medium. It has been pointed out by Lopez et al. [2]
that for WSNs authorization, availability, data freshness, forward security, and self-organization
must be efficiently implemented in addition to confidentiality, authentication, non-repudiation,
and integrity. The security features that must be satisfied by a WSN are listed below.
Confidentiality: The data gathered from sensor nodes must be sent securely to the gateway and
the user.
Integrity: It is the assurance that the data collected by sensor nodes has not been altered in transit.
Mutual Authentication: User, gateway, and the sensor nodes must authenticate each other before
transmitting any data.
Session Key Establishment: Upon successful mutual authentication by all the parties, the session
key must be secretly established between the communicating parties.
Non-Repudiation: It is the assurance that any party in communication cannot deny after sending
or receiving the data.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
95
Availability: Each wireless sensor node must be able to send the data all the time. Therefore, all
the sensor nodes must be kept secure from heavy computations and denial of service attacks.
Authorization: A sensor node must be permitted to perform the computations assigned to it in the
network only if, it is authorized to do so.
Data Freshness: Every node must collect data without delay and the data must not be forged.
Self-Organization: The sensor nodes must be independently able to organize and heal themselves
in abnormal or problematic conditions.
Forward Security: When a new node enters the WSN as a fresh node or in the position of the old
node, it cannot obtain the previous messages. Similarly, when a node exits the network it is
infeasible for it to get the future messages.
1.2 WSN Security Challenges
Designing efficient security protocols for WSNs have been a continuous challenge due to the
following technical limitations.
• Less Computational Capacity - Wireless sensor nodes typically possess a processing capacity
of few MIPS, RAM of few 100s KB and flash memory of less than 1MB. Due to the less
computing capability of wireless sensors, designing and implementing security schemes
which satisfy all the required security functionalities is very challenging.
• Limited Power Supply – Since sensor nodes operate on limited battery power, the security
mechanisms should be selected and implemented such that they avoid heavy computations.
• Unreliable Communication – The data is sent by the sensor nodes through wireless channels
which are unreliable medium and are vulnerable to many threats and attacks. This requires
the implementation of strong security schemes which thwart the attacks on WSN.
These limitations enforce the two major challenges in securing WSNs – threats and the attacks on
WSNs, and difficulties in implementing efficient security measures to counter these threats and
attacks. Dhakne and Chatur [3] have presented an exhaustive survey over attacks made on WSNs
and divided them into five categories – attacks on authentication, attacks on privacy, attacks
based on perspectives, attacks on layers, and other attacks. The detailed classification of attacks
on WSNs has been publicized in Figure 2.
Figure 2. Taxonomy of attacks on WSN
4. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
96
Since wireless sensors are resource-constrained devices, it hasalways challenging to design and
implement efficient security schemes for WSNs satisfying all the security requirements while
simultaneously providing resistance to all the threats and attacks.
2. RELATED WORK
Various security protocols for WSNs based on different cryptographic systems with different
level of security have been proposed by different authors. But the recent focus of the researchers
has been on designing Elliptic Curve Cryptography (ECC) based security mechanisms for WSNs,
since ECC based solutions are suitable for applications involving low computing power devices
like wireless sensors [4]. Therefore in this section, the security protocols for WSNs based on
elliptic curves proposed by different authors have been highlighted.
Choi et al. [5] presented an ECC based authentication mechanism for WSNs which addressed the
security flaws of session key attacksensor energy exhausting attack, and stolen smart card attack,
in the protocol given by Shi and Gong [6].
Wu et al. [7] designed a mutual authentication scheme for the mobile network, which provides
forward security and resistance against insider attack, de-synchronization attack, forgery attack,
replay attack, and known-key attack.
Amin et al. [8] suggested a 3-factor key agreement and authentication scheme which was an
improvement over the protocol developed by Farash et al. [9]. They stated that their protocol
provides additional security features of identity change and smartcard revocation phases, at the
same time protecting from stolen smart-card attack, user impersonation attack, session-specific
attack, and password guessing attack.
Y.H. Park and Y. Park [10] suggested a 3-factor ECC based key-agreement and biometric
authentication scheme which provides user anonymity, forward security, intraceability, mutual
authentication, secure password update and can resist from stolen smart card attack, user
impersonation attack, replay attack, man-in-the-middle attack, and off-line password guessing
attack.
Later, Jiang et al. [11] proved that scheme of Amin et al. [8] is prone to lost smart card attack,
KSSTI (known-session specific temporary information) attack, and tracking attack. They also
designed a Rabin Cryptosystem based 3-factor authentication and key establishment protocol
which overcome all the weaknesses of the protocol given by Amin et al.
Jung et al. [12] exposed that the protocol given by Chang et al. [13] cannot protect against
password guessing, session key compromise, and user impersonation. Furthermore, Jung et al.
pointed out that Chang’s protocol puts a high computational load on the gateway. They also
designed an anonymous key establishment and authentication scheme for WSNs overcoming
security flaws of Chang et al. scheme while consuming less computational cost.
Wang et al. [14] proved that Jung’s [12] protocol is exposed to impersonation attack and offline
dictionary attack. They also revealed that Park & Park’s [10] scheme was unable to satisfy user
anonymity and was also weak against an offline dictionary attack. Then they proposed a 3-factor
user authentication scheme for WSNs which overcame the weaknesses of the schemes given by
Jung et al. and Park et al.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
97
Li et al. [15] revealed that Jiang’s [11] protocol lacks user-friendliness, is inapplicable to IoT
environment, and is vulnerable to KSSTI attack. They designed an anonymous 3-factor
authentication scheme for WSNs which can be used for the IoT environment. Moreover, they
claimed that this scheme provides all the necessary security functionalities and is computationally
efficient.
Recently, Zhang et al. [16] suggested an elliptic curve-based key exchange and authentication
mechanism for WSNs which provides mutual authentication, key establishment, key privacy, user
anonymity and resistance from off-line dictionary attack, replay attack, insider attack,
impersonation attack, stolen verifier attack, and compromised sensor node attack. But, this
scheme consumes more total computational time and puts the high computational load on the
gateway, in comparison to the other similar protocols.
3. A BRIEF REVIEW OF ZHANG’S PROTOCOL
In this section, a brief review of Zhang’s protocol has been presented. As mentioned in the related
work discussed in section 2, the protocol of Zhang et al. [16] enforces heavy computations on the
gateway and consumes more total computational time. The three parties involved in the protocol
are the user𝑈, gateway𝐺𝑊𝑁, and the sensor node𝑆𝑖. The protocol has been divided into three
phases – first is the setup phase, second is the registration phase, and last is the authenticated key
exchange phase. In the setup phase, global parameters for the protocols are selected. If a user 𝑈
wants to collect the data from the sensor node 𝑆𝑖 then it has to register with the gateway
node𝐺𝑊𝑁. Moreover,each sensornode𝑆𝑖also registers with the gateway𝐺𝑊𝑁. User registration
and sensor node registration is done in the registration phase using a secure channel. Here, only
the computations done by the gateway node have been analyzed. The detailed protocol can be
referred from [16]. The steps carried out by the gateway in Zhang’s protocol are given below. The
symbols used in these steps are:
𝑙𝑎𝑏𝑒𝑙 – session label; 𝑋, 𝑇, 𝑐1, 𝑠 𝑚, 𝑠 𝑎- values computed by the user; 𝑆 𝐺𝑁 – secret key of the
gateway node; 𝑃 – the base point of elliptic curve;𝐻1, 𝐻3, 𝐻4 - hash computations; 𝐺𝑁 – gateway
identity; 𝑆𝑖 – sensor node identity; 𝑌, 𝐴𝑢𝑡ℎ 𝑆 𝑖
- values computed by the sensor node; 𝑇𝐺𝑁, 𝑇���� 𝑖
∗
, 𝑇𝑆 𝑖
–
timestamps; ∆𝑇 – expected transmission delay; 𝜎 𝐺𝑁 - signature of 𝑟𝐺𝑁 signed by the gateway.
1. Upon receiving the message {𝑙𝑎𝑏𝑒𝑙, 𝑋, 𝑇, 𝑐1, 𝑠 𝑚, 𝑠 𝑎} from the user, the gateway node computes
the following:
(i) 𝑉 = 𝑆 𝐺𝑁 𝑇
(ii) 𝑅3
∗
= 𝑠 𝑎 𝑃 − 𝑐1 𝑉 − 𝑠 𝑚 𝑇
(iii) 𝑐1
∗
= 𝐻1(𝑃, 𝑇, 𝑅3
∗
, 𝑋, 𝑙𝑎𝑏𝑒𝑙)
(iv) Checks if 𝑐1 = 𝑐1
∗
(v) 𝐾(𝐺𝑁,𝑆 𝑖) = 𝐻3(𝐺𝑁, 𝑆𝑖, 𝑆 𝐺𝑁)
(vi) 𝐴𝑢𝑡ℎ 𝐺𝑁 = 𝐻4(𝐾(𝐺𝑁,𝑆 𝑖), 𝑋, 𝑙𝑎𝑏𝑙𝑒, 𝑇𝐺𝑁)
2. Upon receiving the message {𝑆𝑖, 𝑌, 𝑇𝑆 𝑖
, 𝐴𝑢𝑡ℎ 𝑆 𝑖
} form the sensor node𝑆𝑖, the gateway performs
the following computations:
(i) Checks if 𝑇𝑆 𝑖
∗
− 𝑇𝑆 𝑖
≤ ∆𝑇
(ii) Computes 𝐾(𝐺𝑁,𝑆 𝑖) = 𝐻3(𝐺𝑁, 𝑆𝑖, 𝑆 𝐺𝑁) and verify the validity of𝐴𝑢𝑡ℎ 𝑆 𝑖
.
(iii) Computes 𝑟𝐺𝑁 = 𝐻1(𝑙𝑎𝑏𝑒𝑙, 𝑋, 𝑇, 𝑐1, 𝑠 𝑚, 𝑠 𝑎, 𝑌)
(iv) Creates the signature 𝜎 𝐺𝑁 = 𝑠𝑖𝑔𝑛 𝑆 𝐺𝑁
(𝑟𝐺𝑁)
6. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
98
The most time-consuming operation in elliptic curve based security schemes is the elliptic curve
point multiplication (ECPM) operation. Moreover, the time consumed by all the operations is
very small as compared to the ECPM operation. Therefore, the count of ECPM operations can be
used for the analysis of computational time. In Zhang’s protocol, the gateway node 𝐺𝑊𝑁 is
required to execute four ECPM operations out of which one ECPM operation is executed in the
step (i) of point no. 1 and three ECPM operations are executed in step (ii) of point no. 1. No
ECPM operation is executed in the computations mentioned in point no.2. A total of ten ECPM
operations are executed by Zhang’s protocol. This means that the gateway node 𝐺𝑊𝑁 bears the
40 % computation overhead of the whole protocol, which is the major drawback of Zhang’s
protocol. The computational overhead on the gateway node 𝐺𝑊𝑁 as well as the total
computational time of the protocol can be reduced by using elliptic curve based signcryption
which has been discussed in the next section.
4. PRELIMINARIES
This section provides an introduction to the basic concepts which have been applied in designing
the proposed protocol.
4.1. Mathematics of Elliptic Curve
For cryptographic applications, the elliptic curves defined by Weierstrass Equation 𝑦2
= 𝑥3
+
𝐴𝑥 + 𝐵 over finite field 𝐹𝑞 are used, where 𝐴, 𝐵 ∈ 𝐹𝑞 are constants such that4𝐴3
+ 27𝐵2
≠ 0.
The main reason for using the Weierstrass Equation for defining elliptic curve is that, frameworks
for implementation are available in many programming languages including java and python. An
elliptic curve symbolized by 𝐸 over 𝐹𝑞 is the set of all the points (𝑥, 𝑦) along with a distinct point
𝑂known as the point on infinity. These points are represented as:
𝐸(𝐹𝑞) = {(𝑥, 𝑦) ∈ 𝐹𝑞 × 𝐹𝑞: 𝑦2
= 𝑥3
+ 𝐴𝑥 + 𝐵} ∪ {𝑂}
The operation and rules for elliptic curve 𝐸(𝐹𝑞) are given below.
• Identity Element – For each point 𝑅 ∈ 𝐸(𝐹𝑞), there subsists an identity element 𝑂 such that
𝑂 + 𝑅 = 𝑅 + 𝑂 = 𝑅
• Point Addition – Let 𝑄, 𝑅 ∈ 𝐹𝑞 be the two points on elliptic curve𝐸, where 𝑄 = (𝑥1, 𝑦1) and
𝑅 = (𝑥2, 𝑦2) and𝑄 ≠ ±𝑅. The addition of 𝑄𝑎𝑛𝑑𝑅 is defined as𝑄 + 𝑅 = (𝑥3, 𝑦3), where 𝑥3
and 𝑦3 are given by:
𝑥3 = 𝜆2
− 𝑥1 − 𝑥2and𝑦3 = 𝜆(𝑥1 − 𝑥3) − 𝑦1
with𝜆 =
𝑦2−𝑦1
𝑥2−𝑥1
if 𝑄 ≠ 𝑅 and 𝜆 =
3𝑥1
2+𝐴
2𝑦1
if 𝑄 = 𝑅
• Point Multiplication – Let 𝑄 ∈ 𝐸(𝐹𝑞) and an integer𝑘. The multiplication of point 𝑄 with 𝑘
is defined by𝑘𝑄 = 𝑄 + 𝑄 + ⋯ + 𝑄(𝑘𝑡𝑖𝑚𝑒𝑠).
• Negative – Let 𝑄 = (𝑥, 𝑦) ∈ 𝐸(𝐹𝑞) then the negative of point 𝑄 is defined as − 𝑄 = (𝑥, −𝑦)
and𝑄 + (−𝑄) = 𝑂. Moreover, −𝑂 = 𝑂.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
99
4.2. Strength of Elliptic Curve Cryptography
The strength of the elliptic curve-based cryptosystem is ensured by the three computationally hard
problems given below. An elliptic curve 𝐸(𝐹𝑞) has been considered in the definition of these
problems.
1. Elliptic Curve Based Discrete Logarithmic Problem (ECDLP) – For known two points𝑄, 𝑅 ∈
𝐸(𝐹𝑞), it is computationally infeasible to get an integer𝑘 so that𝑅 = 𝑘𝑄 [17].
2. Elliptic Curve Based Diffie-Hellman Problem (ECDHP) – Given a point𝑄 ∈ 𝐸(𝐹𝑞), and
consider two other points 𝑅 = 𝑎𝑄 and 𝑆 = 𝑏𝑄 on the same elliptic curve𝐸(𝐹𝑞), where𝑎, 𝑏 ∈
𝐼𝑛𝑡𝑒𝑔𝑒𝑟. Determining a point 𝑇 = 𝑎𝑏𝑄 is computationally hard [18].
3. Elliptic Curve Based Decision Diffie-Hellman Problem (ECDDHP) - Given a point𝑄 ∈
𝐸(𝐹𝑞), and consider three other points𝑅 = 𝑎𝑄,𝑆 = 𝑏𝑄 and𝑇 = 𝑐𝑄. It is computationally
infeasible to conclude that if𝑇 = 𝑎𝑏𝑄 [19].
4.3. Overview of Signcryption
Signcryption which integrates confidentiality and authentication in a single-phase logically was
proposed by Y. Zheng [20]. Zheng showed that encryption consumes 50% less time in
computation and 85% less bandwidth than the signature-then-encryption process which is
traditionally followed. Y. Zheng and H. Imai [21] applied elliptic curves in signcryption and
proposed the first signcryption mechanism based on the elliptic curve. They proved that elliptic
curve signcryption consumes 58% less time and 40% less communication bandwidth than the
signature-then-encryption mechanism based on the elliptic curve. For low computing power
devices (LCPDs) it is wise to use elliptic curve signcryption schemes, since it saves a huge
amount of computational time and communication bandwidth, while also providing many
security attributes including authentication, secure key establishment, confidentiality, non-
repudiation, integrity, unforgeability, and forward security [4]. The elliptic curve signcryption
scheme proposed by Y. Zheng and H. Imai [21] has been publicized in Figure 3 to provide a
glimpse that how elliptic curves can be used in designing signcryption schemes. The process of
signcryption is carried out in three phases – first is the initialization phase, second is the
signcryption phase and, last is the un-signcryption phase. In the initialization phase, the global
public parameters and key pairs are selected. Signcryption phase implements confidentiality and
signature functionality. In the un-signcryption phase decryption and signature verification is
carried out. In Figure 4 the sender is Alice and the receiver is Bob, Msg is the message sent by the
Alice to the Bob, and SECDSS is Shortened Elliptic Curve Digital Signature Standard.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
100
{c, d, s}
Public Parameters are Selected
E: An elliptic curve on GF(pw
)
(p ≥ 2160
and w = 1 or p = 2 and w ≥ 160)
q: A large prime number with order (pw
-1).
G: Random point on E having order q.
HSH: One-way hash function.
KSH: Keyed one-way hash function.
EN: Symmetric encryption
DE: Symmetric decryption
Initialization Phase
Key Pairs of Alice and Bob are Chosen
(i) For Alice
Private key: Random vx < q
Public key: Px = vx G
(ii) For Bob
Private key: Random vy < q
Public key : Py = vy G
Signcryption by Alice
• Randomly selects u < q
• (k, l)=HSH(uPy)
• c = ENk (Msg)
• d = KSHl (Msg, blind_info)
• s = u/(d + vx) mod q
• v = svy mod q
• (k, l) = HSH(vPx + vdG)
When SECDSS1 is used
• (k, l) = HSH (vG + vdPx),
When SECDSS2 is used
• Msg = DEk(c), Accept Msg if
KSHl (Msg, blind_info) = d
Un-signcryption by Bob
Figure 3. Elliptic Curve based Signcryption by Zheng and Imai [21]
5. PROPOSED PROTOCOL
In this section, a novel elliptic curve signcryption based security protocol for wireless sensor
networks has been proposed and elucidated in detail. The proposed security protocol presented
here has three phases – first is setup phase, second is the registration phase, and the third is the
signcryption and key-establishment phase. The symbols and notations utilized in the proposed
protocol are mentioned in Table 1.
5.1. Setup Phase
In the setup phase, global parameters for the system are selected by the gateway. The gateway
also generates its private and public keys in this phase. The steps of the setup phase are:
1. The gateway selects an elliptic curve 𝐸: 𝑦2
= 𝑥3
+ 𝐴𝑥 + 𝐵over the finite field 𝐹𝑞with curve
parameters {𝑞, 𝐴, 𝐵, 𝐺, 𝑛} satisfying 4𝐴3
+ 27𝐵2
≠ 0 and having point at infinity𝑂.
2. The gateway selects a private key 𝑣 𝐺 ∈ 𝑍 𝑛 and generates its public key𝑃𝐺 = 𝑣 𝐺 𝐺.
3. The gateway also selects the hash function𝐻: {0 , 1}∗
→ {0 , 1}𝑙
.
4. All the public parameters { 𝐹𝑞 , 𝐸(𝐹𝑞), 𝑞, 𝐴, 𝐵, 𝐺, 𝑛, 𝑃, 𝐺, 𝐻} are made available to all the
parties in the WSN.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
101
Table 1. Notations and symbols used in proposed protocol.
Symbol Notation
Fq Finite prime field of size q
E Elliptic curve over Fq
A,B Curve parameters for E
G Generator of 𝐸 with order n
q.n Two large prime numbers
IDU User identity
IDG Gateway identity
PWU Password of the user
H Hash computation
TG Time stamp of the gateway
TSi Time stamp of the sensor node
⊕ Exclusive OR
K Established shared key
T Current timestamp
t Average transmission delay
5.2. Registration Phase
A user willing to collect the data from a sensor node 𝑆𝑖, has to register itself to the gateway.
Moreover, the sensor node 𝑆𝑖 has also to register with the gateway node. The registration of the
user to the gateway has been shown in Figure 4. All the messages in the following steps of the
registration phase are sent using a secure channel.
1. The user selects its identity and password as {𝐼𝐷 𝑢, 𝑃𝑊𝑢}.
2. User computes 𝑃𝑢 = 𝐼𝐷 𝑢 𝐺 and transmits the message {𝑃𝑢}to the gateway.
3. On receiving the public key {𝑃𝑢} from the user, the gateway computes the following:
• Generates the key 𝐾 𝐺𝑈 = 𝐻(𝑣 𝐺 𝑃𝑢)
• Creates the ciphertext𝑐1 = 𝐸 𝐾𝐺𝑈(𝐼𝐷 𝐺)
• Calculates the intermediate value𝑟1 = 𝐻(𝑐1 ⊕ 𝐾 𝐺𝑈)
• Calculates another intermediate value 𝑤1 = 𝑣 𝐺/𝑟1
• Computes 𝑇1 = 𝑟1 𝐺
The gateway sends the signcrypted text {𝑐1, 𝑇1, 𝑃G} to the user.
4. Upon receiving {𝑐1, 𝑇1, 𝑃G}from the gateway, the user computes𝐾 𝐺𝑈
∗
= 𝐻(𝐼𝐷 𝑢 𝑃𝐺),𝑑1 =
𝐷 𝐾 𝐺𝑈
∗(𝑐1),𝑟1
∗
= 𝐻(𝑐1 ⊕ 𝐾 𝐺𝑈
∗
), and𝑇1
∗
= 𝑟1
∗
𝐺. If 𝑇1
∗
= 𝑇1then the gateway is successfully
authenticated by the user, and then the user computes 𝐻(𝑃𝑊𝑢)and𝑐 𝑟 = 𝑑1 + 𝐻(𝑃𝑊𝑢).
Finally the user saves the credential𝑐 𝑟.
A sensor node 𝑆𝑖 willing to register itself to the gateway sends the request containing𝐼𝐷𝑆𝑖 to the
gateway. On receiving the request from sensor 𝑆𝑖 gateway computes a secret key 𝐾 𝐺𝑆 𝑖
=
𝐻(𝐼𝐷𝑆𝑖 , 𝐼𝐷 𝐺, 𝑣 𝐺)and send 𝐾 𝐺𝑆 𝑖
to the sensor node.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
102
USER GATEWAY
,u uID PW GID
u uP ID G= Private Key nGv Z
{ }uP Public Key G GP v G=
( )uGU GK H v P=
( )1 GUK Gc E ID=
( )1 1 GUr H c K=
1 1T rG=
{𝑐1, 𝑇1, 𝑃𝐺}
( )* uGU GK H ID P=
( )11 *GUKd D c=
( )1 1* *GUr H c K=
1 1* *T r G=
If 1 1*T T= then Gateway is authenticated.
Compute ( )uH PW
Save credential 1 ( )r uc d H PW= +
5.3. Signcryption and Key Establishment Phase
In this phase mutual authentication, confidentiality, and key establishment functionalities are
implemented. The user, gateway, and the sensor node authenticate each other. After the
successful execution of all the steps of this phase, a secret session key is generated and distributed
securely between the sensor node and the user. Signcryption and key establishment phase has
been demonstrated in Figure 5. The steps are given below.
Figure 4. Registration of user with the gateway.
1. The user selects a private number 𝑥 ∈ 𝑍 𝑛 and computes𝑋 = 𝑥𝐺. It also denote the session
label𝐿 = (𝐼𝐷 𝐺, 𝐼𝐷𝑠𝑖). The user then performs the following computations -
• Retrieve 𝑑1 = 𝑐 𝑟 − 𝐻(𝑃𝑊𝑢)
• Compute the key 𝐾 𝑈𝐺 = 𝐻(𝐼𝐷 𝑈 𝑃𝐺)
• Compute the ciphertext𝑐2 = 𝐸 𝐾𝑈𝐺(𝑑1)
• Compute 𝑟2 = 𝐻(𝑐2 ⊕ 𝐾 𝑈𝐺)
• Calculate𝑤2 = 𝐼𝐷 𝑈/𝑟2 , and𝑇2 = 𝑟2 𝐺.
The user combines the signcrypted text {𝑐2, 𝑇2, 𝑤2}with{𝐿, 𝑋, 𝑃 𝑈} and sends the message
{𝐿, 𝑋, 𝑃 𝑈, 𝑐2, 𝑇2, 𝑤2} to the gateway.
2. Upon receiving the message {, 𝑋, 𝑃 𝑈, 𝑐2, 𝑇2, 𝑤2}from the user, the gateway first generates the
key as 𝐾 𝑈𝐺
∗
= 𝐻(𝑣 𝐺 𝑤2 𝑃 𝑈) and decrypt 𝑐2 as𝑐2
∗
= 𝐷 𝐾 𝑈𝐺
∗(𝑐2). The gateway checks whether
𝑐2
∗
= 𝐼𝐷 𝐺 or not. If not then it terminates the session and if yes then it computes 𝑟2
∗
=
𝐻(𝑐2 ⊕ 𝐾 𝑈𝐺
∗
)and𝑇2
∗
= 𝑟2
∗
𝐺. If 𝑇2 = 𝑇2
∗
then the user is authenticated by the gateway. The
gateway then computes the hash code of the secret key as𝐴 𝐺𝑆 = 𝐻(𝐾 𝐺𝑆 𝑖
), records the
timestamp𝑇𝐺 and sends the message {𝐿, 𝑋, 𝑇𝐺, 𝐴 𝐺𝑆}to the sensor node.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
103
USER GATEWAY SENSOR
{ , }r uC PW ,{ }G iGSv K { }iGSK
Selects private nx Z , Compute X xG=
Label ( ), isGL ID ID=
Compute ( )1 r ud c H PW= −
( )UG U GK H ID P= , ( )12 UGKc E d=
( )22 UGr H c K= ,
2
2
U
w
ID
r
=
22T r G= 2 2 2, , , , ,UL X P c T w ( )2* G UUG vH wK P= , ( )22 ** UGKc D c=
If 2* Gc ID= then
( )22* *UGr H c K= , 22* *T r G=
If 22 *T T= then User authenticated
( )iGS GSA H K= , Timestamp GT
, , ,G GSL X T A
If GT tT− then verify GSA
Select private ny Z , Compute Y yG=
( ), , , ,, i
iSU GS G SX YA TH L TK=
Shared Key K yX=
Session Key ( , , , )KS H L X Y K=
Timestamp iST
, , ,i
i
S S SUID Y T A
If iST tT− , then verify SUA
( )* 23 *UGKE Tc =
3{ , , }Y L c
( )23* UGKc E T= , If 3 3*c c= then
Shared Key K xY=
Session Key ( , , , )KS H L X Y K=
3. Upon receiving the message {𝐿, 𝑋, 𝑇𝐺, 𝐴 𝐺𝑆}from the gateway, the sensor node 𝑆𝑖checks if𝑇 −
𝑇𝐺 ≤ 𝑡, where T is the present time stamp and t is the average transmission delay. If it is true
then node 𝑆𝑖first verifies the correctness of 𝐴 𝐺𝑆 by computing the hash code𝐻(𝐾 𝐺𝑆 𝑖
). If 𝐴 𝐺𝑆is
correct then it selects private number𝑦 ∈ 𝑍 𝑛, computes𝑌 = 𝑦𝐺 and records the current
timestamp𝑇𝑆 𝑖
. It also computes𝐴 𝑆𝑈 = 𝐻(𝐿, 𝐾 𝐺𝑆 𝑖
, 𝑋, 𝑌, 𝑇𝐺, 𝑇𝑆 𝑖
), the shared secret key 𝐾 = 𝑦𝑋
with the user, and the session key𝑆 𝑘 = 𝐻(𝐿, 𝑋, 𝑌, 𝐾). The node𝑆𝑖 sends the message
{𝐼𝐷𝑆 𝑖
, 𝑌, 𝑇𝑆 𝑖
, 𝐴 𝑆𝑈} to the gateway.
4. When the message {𝐼𝐷𝑆 𝑖
, 𝑌, 𝑇𝑆 𝑖
, 𝐴 𝑆𝑈} is received by the gateway it checks if𝑇 − 𝑇𝑆 𝑖
≤ 𝑡,
where T is the present time-stamp and t is the average transmission delay. If it is true then
gateway verifies the correctness of 𝐴 𝑆𝑈 by computing the hash code𝐻(𝐿, 𝐾 𝐺𝑆 𝑖
, 𝑋, 𝑌, 𝑇𝐺, 𝑇𝑆 𝑖
),
if 𝐴 𝑆𝑈 is found correct then the gateway computes𝑐3 = 𝐸 𝐾 𝑈𝐺
∗(𝑇2
∗
). The gateway then sends
the message {𝑌, 𝐿, 𝑐3} to the user.
5. Upon receiving {𝑌, 𝐿, 𝑐3} from the gateway, the user computes 𝑐3
∗
= 𝐸 𝐾 𝑈𝐺
(𝑇2)and if 𝑐3
∗
=
𝑐3 then it authenticates the gateway. It computes the shred secret key 𝐾 = 𝑥𝑌and session
key𝑆 𝑘 = 𝐻(𝐿, 𝑋, 𝑌, 𝐾).
The established shared key K between the user and the sensor node 𝑆𝑖 can be used for the
upcoming communication.
Figure 5. Signcryption and key establishment phase of the proposed protocol.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
104
6. ANALYSIS OF SECURITY FUNCTIONS OF THE PROPOSED PROTOCOL
In this section of the paper, an analysis of the security functionalities provided by the proposed
protocol has been carried out. The two dimensions of analyzing the security functionalities are,
the security attributes satisfied by the proposed protocol and the resistance provided from
different attacks. The following reasonable assumptions have been considered to sustain security
analysis.
A1: Secure channel is used for registration of the sensor node as well as the user, to the gateway.
A2: An adversary can obtain common system parameters from a corrupted node.
A3: The private number 𝑥selected by the user and the private number 𝑦 selected by the sensor
node are fresh for every session.
A4: The encryption algorithm is strong enough that an adversary is unable to decode the
ciphertext.
A5: Given 𝑅 and𝑄, the adversary is unable to compute 𝑝in 𝑅 = 𝑝𝑄, due to the strength of
ECDLP.
6.1. Analysis of Security Attributes
The proposed elliptic curve signcryption protocol satisfies anonymity, confidentiality, secure key
establishment, mutual authentication, key privacy, untraceability and forward security.
6.1.1.User Anonymity
User identity must be kept secret because if it is exposed then any unauthorized party can trace
the login pattern of the user [12]. In the proposed elliptic curve signcryption protocol, the identity
of the user is kept secret and not transmitted in any of the messages. The user’s public key 𝑃 𝑈 is
transmitted, and according to assumption A5, due to the strength of ECDLP the adversary cannot
find 𝐼𝐷 𝑈 given 𝑃 𝑈 and G. Therefore, the proposed protocol provides strong user anonymity.
6.1.2.Confidentiality
The four messages have been exchanged in the signcryption and key establishment phase of our
protocol. The very first message is {𝐿, 𝑋, 𝑃 𝑈, 𝑐2, 𝑇2, 𝑤2} in which the components
𝑋, 𝑃 𝑈, 𝑐2, 𝑇2 𝑎𝑛𝑑𝑤2 contain the secret information. Retrieving secret values of 𝐼𝐷 𝑈, 𝑥, and 𝑟2 from
𝑋, 𝑃 𝑈, and 𝑇2 respectively is infeasible due to the security of ECDLP, as mentioned in the
assumption A5. The ciphertext𝑐2 cannot be decoded by an adversary without knowing the
key𝐾 𝑈𝐺. Moreover, to deduce𝐾 𝑈𝐺, the adversary needs identity 𝐼𝐷 𝑈of the user, which cannot be
known as the proposed protocol provides user anonymity. The component 𝑤2 is obtained by
dividing the 𝐼𝐷 𝑈 by𝑟2 which are privately generated. The second message is {𝐿, 𝑋, 𝑇𝐺, 𝐴 𝐺𝑆} in
which 𝑋 and 𝐴 𝐺𝑆 covers secret values𝑥, and 𝐾 𝐺𝑆 𝑖
respectively. The secret 𝑥 cannot be obtained
from 𝑋 due to the security of ECDLP and 𝐾 𝐺𝑆 𝑖
cannot be obtained from𝐴 𝐺𝑆, due to the property
of random oracles. The third message is {𝐼𝐷𝑆𝑖, 𝑌, 𝑇𝑆𝑖, 𝐴 𝑆𝑈} in which the components 𝑌 and 𝐴 𝑆𝑈
protects the secret 𝑦 and 𝐾 𝐺𝑆 𝑖
respectively since, the secret 𝑦 cannot be obtained from 𝑌 due to the
strength of ECDLP and 𝐾 𝐺𝑆 𝑖
cannot be obtained form 𝐴 𝑆𝑈 due to the property of random oracles.
The fourth message is {𝑌, 𝐿, 𝑐3} which contains the components 𝑌 and 𝑐3 protecting secret
information. Again, the confidential information in 𝑌 and 𝑐3 is secure as per assumptions A5 and
A4 respectively. Therefore, the proposed protocol provides confidentiality of secret information.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
105
6.1.3. Secure Key Establishment
In our protocol, after executing all the steps the key 𝐾 is generated and shared securely between
the sensor and the user. In establishing the secure key, the values 𝑋 and 𝑌 are transmitted between
the user and the sensor. As per assumption A5, an adversary cannot obtain private values 𝑥 and 𝑦
from 𝑋 and 𝑌 respectively. Hence, the protocol successfully achieves a secure key establishment
between the sensor node and the user.
6.1.4. Key Privacy
The private keys 𝑥 and 𝑦 of the user and the gateway respectively along with the shared key 𝐾
established in the protocol, are kept secret and adversary cannot access them. As per assumption
A5, an adversary cannot obtain private values 𝑥 and 𝑦 from 𝑋 and 𝑌 respectively, and in turn
cannot generate key𝐾. Thus, the proposed signcryption based protocol provides key privacy.
6.1.5. Mutual Authentication
The proposed signcryption based protocol implements mutual authentication between the two pair
of parties, first the user and the gateway, second the gateway and the sensor node.
In mutual authentication between the gateway and the user, the user is authenticated by the
gateway if𝑇2 = 𝑇2
∗
, where 𝑇2is the authentication information sent by the user and 𝑇2
∗
is
computed by the gateway. Similarly, the gateway is authenticated by the user if𝑐3
∗
= 𝑐3,
where𝑐3
∗
is computed by the gateway and 𝑐3 is computed by the user.
In mutual authentication between the sensor node and the gateway, the gateway computes 𝐴 𝐺𝑆 =
𝐻(𝐾 𝐺𝑆𝑖) and sends 𝐴 𝐺𝑆 to the sensor node. Upon receiving 𝐴 𝐺𝑆 from the gateway, the sensor
node computes𝐴 𝐺𝑆
∗
which is the hash code of the shared key 𝐾 𝐺𝑆𝑖 stored with it, and if𝐴 𝐺𝑆
∗
=
𝐴 𝐺𝑆then the gateway is successfully authenticated by the sensor node. Similarly, the sensor node
sends 𝐴 𝑆𝑈 = 𝐻(𝐿, 𝐾 𝐺𝑆𝑖, 𝑋, 𝑌, 𝑇𝐺, 𝑇𝑆 𝑖
) to gateway, and upon receiving 𝐴 𝑆𝑈the gateway then
verifies the correctness of 𝐴 𝑆𝑈 by computing the hash code of {𝐿, 𝐾 𝐺𝑆 𝑖
, 𝑋, 𝑌, 𝑇𝐺, 𝑇𝑆 𝑖
} and then
authenticates the sensor node. In this manner the protocol achieves mutual authentication between
the two pair of parties.
Furthermore, the authentication data 𝑇2, 𝑐3, 𝐴 𝐺𝑆and 𝐴 𝑆𝑈generated in the process of mutual
authentication is unforgeable. The authentication data𝑇2 depends upon 𝑟2 which in turn depends
upon 𝐼𝐷 𝑈 which is kept secret. In order to forge𝑐3 the adversary needs 𝐾 𝑈𝐺
∗
which depends upon
random private secret 𝑣 𝐺 of the gateway. Finally,𝐴 𝐺𝑆and 𝐴 𝑆𝑈 are the hash codes of the key 𝐾 𝐺𝑆𝑖
which is shared between the sensor and the gateway over a protected channel. Therefore, the
authentication data generated in all the messages of the protocol is unforgeable.
6.1.6. Forward Secrecy
Even if the adversary somehow obtains the secret key𝐾, it cannot get the messages sent in the
past sessions since the private values of 𝑥 and 𝑦 selected randomly by the user and the sensor
respectively are fresh for every session. Moreover, if a sensor node joins the network in place of
some other one then it cannot get the past messages due to unavailability of private values 𝑥 and
𝑦 of past sessions. Thus the proposed protocol provides forward security.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
106
6.1.7. Untraceability
It is the assurance that an opponent cannot trace the sessions of the user by analyzing the
messages in the protocol. In the proposed protocol private random number 𝑥 is used, which is
freshly generated in every session. This makes the user to use different values of 𝑋, 𝑐2, 𝑇2 and 𝑤2
for different sessions in its messages. Thus, the proposed protocol satisfies untraceability.
6.2. Analysis of Resistance from Attacks
The security protocol for WSNs must be able to thwart the attacks attempted over the WSN
system. In this subsection, the strength of the proposed WSN protocol from different attacks has
been analyzed. The following adversary model given by Wang et al. [14] has been considered in
this analysis.
1. An 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦 𝐴 has the capability to intercept, modify, resend, and delete the message after
eavesdropping the open communication channel.
2. An 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 can obtain the long term session key.
3. An 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 can get the password of the user or its parameters, but not both.
4. An 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 is capable of getting the data from an unattended sensor node.
6.2.1 Resistance from Replay Attack
In replay attack, an 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 records the legitimate message from a party and replays it later
to the other party to produce an unauthorized effect. The analysis of the replay attack for the
proposed protocol can be broken into two parts. First is the analysis of the replay attack between
the user and the gateway, and the second is the analysis of the replay attack between the gateway
and the sensor node.
If an 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 replays the past recorded message {𝐿, 𝑋, 𝑃 𝑈, 𝑐2, 𝑇2, 𝑤2} to the gateway then,
the gateway performs the computations in step2 of signcryption and key establishment phase and
sends the message {𝐿, 𝑋, 𝑇𝐺, 𝐴 𝐺𝑆} to the sensor node, which in turn performs the computations
mentioned in step 3 of this phase and sends the message {𝑌, 𝐿, 𝑐3} to the 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴. But,
𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 cannot generate the shared key 𝐾 = 𝑥𝑌 correctly since, it does not know the private
random number𝑥 of the user. If an 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 replays the past message {𝑌, 𝐿, 𝑐3} to the user
then also the shared key generated by the user will not match with the key generated by the sensor
node since the fresh value of private random number𝑥 will be used by the user in generating the
shared key𝐾 = 𝑥𝑌. Thus in both these cases, the shared key of the sensor node and the user will
not match and the attack will fail.
When an 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 sends the previous recorded message {𝐿, 𝑋, 𝑇𝐺, 𝐴 𝐺𝑆}to the sensor node
then the sensor node will ignore the it, since time stamp has been used by the protocol to thwart
the replay attack. Similarly, if an 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴 tries to befool the gateway by sending the
message {𝐼𝐷𝑆 𝑖
, 𝑌, 𝑇𝑆𝑖, 𝐴 𝑆𝑈} then also this message will be rejected as the timestamp used in this
messages is the older one.
In this way, the proposed protocol successfully thwart replay attack.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
107
6.2.2 Resistance from Offline Dictionary Attack
Even if an attacker somehow acquires the password 𝑃𝑊𝑢 of the user, it is not able to create
correct credential 𝑐 𝑟 to authenticate itself to the gateway and gateway will terminate the session.
The credential 𝑐 𝑟depends upon the identity 𝐼𝐷 𝐺 and the private key 𝑣 𝐺of the gateway, which
cannot be obtained by the𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦𝐴. So, our protocol is secure from an offline dictionary
attack.
6.3.3 Resistance from Insider Attack
The user sends the message {𝐿, 𝑋, 𝑃 𝑈, 𝑐2, 𝑇2, 𝑤2} to the gateway. From this message, the gateway
cannot extract any secret information, especially the password of the user. Therefore the proposed
protocol can counter insider attack.
6.3.4. Resistance from Stolen Verifier Attack
The gateway stores the verifier table which does not reveal sensitive information i.e. even if an
attacker obtains this table it cannot make any attack [16]. Hence, our protocol is safe against
stolen-verifier attack.
6.3.5. Resistance from Impersonation Attack
In impersonation, an opponent pretends to be a legitimate party in to obtain confidential
information from the other genuine party. In the proposed protocol for WSNs, an 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑦 𝐴
is unable to impersonate the user to the gateway, because to authenticate itself to the gateway it
requires the identity of the user 𝐼𝐷 𝑈which is kept secret. Similarly, an attacker is unable to
impersonate the sensor node to the gateway since it cannot access the key𝐾 𝐺𝑆 𝑖
. Moreover, the
attacker fails in impersonating the gateway to the user and gateway to the sensor node, since it
cannot obtain 𝑣 𝐺 and 𝐾 𝐺𝑆 𝑖
respectively. So, the proposed protocol can counter impersonation
attacks.
7. PERFORMANCE ANALYSIS
In this section, the performance of the proposed signcryption based WSN security protocol has
been analyzed by measuring computational cost and the communication bandwidth required for
the protocol. Furthermore, a comparison of costs and security functionalities has been made to
show that the proposed security protocol is more efficient to the computational time as compared
to the related protocols mentioned in [5, 7, 11, 14, 15 and 16]. For all the protocols it has been
assumed that 160 bit ECC has been used by all the parties in the communication. In addition to
this, it is presumed that the proposed protocol uses AES-128 algorithm for encryption/decryption
and SHA-1 algorithm for producing the hash code of the input. The two main reasons for
choosing AES-128 algorithm for encryption/decryption are – first 128-bit key will not put more
computational load on the wireless sensors which is a low computing power device and second,
the cryptographic support for implementing AES-128 is available in wireless sensors [4].
7.1. Analysis of Computational Time and Communication Cost
The computational time consumed by the protocol can be calculated by counting the key
operations and then multiplying this count with the time taken by a single operation. On a 64-bit
2.5 GHz i7 processor having 8 GB RAM, a single elliptic curve point multiplication (ECPM),one
16. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
108
hash computation, and one encryption/decryption take 0.427576 ms, 0.005174 ms, and,
0.0214835 ms respectively [7]. The time consumed by other operations is very less and therefore
has been ignored in the analysis. It can be observed that the time consumed by a single ECPM
operation is highest in comparison to the other operations. Based on this fact, the computational
time for each protocol has been calculated for all the three parties in the communication and is
demonstrated in Table 2. The total computational times of all the protocols have been shown in
Table 3. The graphical representation of this comparison of computational time has been shown
in Figure 6 (a). The bandwidth consumed by each protocol has been computed by calculating the
size of messages sent by the three parties – the user, the gateway, and the sensor, and then adding
them. The comparison of bandwidth consumed by each protocol has been shown in Table 3, and a
graphical representation of the same has been shown in Figure 6 (b).
Table 2. Comparison of computational time consumed by the user, the sensor, and the gateway.
e-Encryption/Decryption, m-Elliptic Curve Point Multiplication, h-Hash Computation, N-Number of
rounds, TU-Time consumed by the user, TG- Time consumed by the gateway, TS- Time consumed by the
sensor node
7.2. Comparison of Security Functionalities
As discussed in section 5, the proposed protocol provides mutual authentication, anonymity,
confidentiality, secure key establishment, key privacy, untraceability, and forward security at the
same time providing resistance against replay attack, insider attack, offline dictionary attack,
stolen verifier attack, and impersonation attack. A comparative analysis of the security functions
of the proposed signcryption based protocol with the protocols mentioned in [5, 7, 11, 14, 15, 16]
has been shown in Table 4.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
109
0
1
2
3
4
5
Time(ms)
User Gateway Sensor Total
0
1000
2000
3000
4000
5000
Bandwidth(bits)
Total Bandwidth
Table 3. Comparison of total computational time and bandwidth.
Protocol Total Time (ms) Bandwidth (bits)
[5] 2.32808 3072
[7] 1.93076 3168
[11] 0.98450 1856
[14] 2.76364 3968
[15] 1.39138 2912
[16] 4.32750 2976
Proposed 3.56345 3136
8. DISCUSSION
In this section, a brief discussion of the comparisons and results mentioned in section 6 has been
made. The proposed elliptic curve signcryption protocol for WSNs has been compared with the
protocols in [5, 7, 11, 14, 15 and 16]. From Table 4 it can be observed that the proposed protocol
and the protocol given by Zhang et al. [16] are the only two protocols which provide all the
necessary security functionalities. And from Table 3 it has been revealed that the computational
time consumed by the proposed signcryption-based protocol is 3.56345 ms while the time taken
by Zhang’s protocol is 4.32750ms. Furthermore, the number of ECPM operations on the gateway
in the proposed protocol is 2, while in the Zhang’s protocol 4 ECPM operations are executed on
the gateway. Due to this, the time consumed at the gateway in the proposed protocol is 0.91881
ms and the time consumed at the gateway in Zhang’s protocol is 1.73617 ms. Therefore, the
proposed protocol puts the less computational load on the gateway which makes it better for the
WSNs. The bandwidth of the proposed protocol is slightly more than Zhang’s protocol. It can be
concluded that the proposed protocol is more computational time efficient as compared to all the
other protocols mentioned in [5, 7, 11, 14, 15 and 16] at the same time providing a same or
greater level of security. The novelty of the proposed signcryption-based security protocol is
projected from the fact that it consumes least computational time at the same time satisfying all
the required security functionalities.
Figure 6 (a). Comparison of computational time. Figure 6 (b). Comparison of bandwidth.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
110
Table 4: Comparison of security functions of different protocols.
Protocol
Security features Resistance against attacks
ANY
CNF
FWS
SKE
KEP
MUA
UNT
RPL
USI
STV
SNI
ODY
INS
[5] × ✓ ✓ ✓ ✓ ✓ × ✓ ✓ × ✓ × ×
[7] × ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
[11] × ✓ ✓ ✓ × ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
[14] × ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
[15] × ✓ ✓ ✓ × ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
[16] ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Proposed ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
ANY-Anonymity, CNF-Confidentiality, FWS-Forward Secrecy, SKE-Secure key establishment, KEP-Key
Privacy, MUA-Mutual authentication, UNT-Untraceability, RPL-Replay attack, USI- User impersonation,
STV-Stolen verifier attack, SNI-Sensor node impersonation, ODY-Offline dictionary attack, INS-Insider
attack, ✓-Fulfilled, × - Not fulfilled.
9. CONCLUSION
WSNs are used widely in many critical applications, and therefore securing WSNs has been on
priority for the research community. In this article, a novel elliptic curve signcryption based
security protocol for WSNs has been presented which successfully provides user anonymity,
confidentiality, mutual authentication, and secure key establishment at the same time taking less
computational time than the other related schemes. It has been revealed that the proposed
protocol also provides security from an offline dictionary attack, insider attack, impersonation
attack, replay attack, and stolen verifier attack. In addition to providing the required security
functionalities, our signcryption based protocol consumes least computational time for the
gateway in comparison to the other protocols while providing same or higher security level,
which makes it suitable to be used for security and privacy critical applications of WSNs.
REFERENCES
[1] M. Kocakulak, and I. Butun, “An overview of Wireless Sensor Networks towards internet of
things,”in Proc. of the IEEE 7th Annual Computing and Communication Workshop and Conference
(CCWC), Las Vegas, USA, Dec 2016, pp. 1-6.
[2] J. Lopez, R. Roman, and C. Alcaraz, “Analysis of Security Threats, Requirements, Technologies and
Standards in Wireless Sensor Networks,” in Foundations of Security Analysis and Design V. FOSAD
2009, FOSAD 2007, FOSAD 2008. Lecture Notes in Computer Science Volume 5705,A. Aldini,G.
Barthe, R. Gorrieri, Eds., Springer, Berlin, Heidelberg, 2009, pp. 289-338.
[3] A. Dhakne, and P. Chatur, “Detailed Survey on Attacks in Wireless Sensor Network,” inProc. of the
International Conference on Data Engineering and Communication Technology. Advances in
Intelligent Systems and Computing, Singapore, 2017, pp. 319-331.
19. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
111
[4] A.K. Singh, and B.D.K.Patro, “Security of Low Computing Power Devices: A Survey of
Requirements, Challenges & Possible Solutions,” Cybernetics and Information Technologies, Vol. 19,
No. 1, 2019, pp. 133-164.
[5] Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won, “Security Enhanced User Authentication
Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography,” Sensors, Vol. 14, 2014,
pp. 10081-10106.
[6] W. Shi, and P. Gong, “A new user authentication protocol for wireless sensor networks using elliptic
curves cryptography,”International Journal of Distributed Sensor Networks, 2013pp. 1-7. doi.
10.1155/2013/730831.
[7] F. Wu, L. Xu, S. Kumari, X. Li, A.K. Das, M.K. Khan, M. Karuppiah, and R. Baliyan, R,“A novel
and provably secure authentication and key agreement scheme with user anonymity for global
mobility networks,”Security and Communication Networks, Vol. 9, 2016, pp. 3527-3542.
[8] R. Amin, S.K.H. Islam, G.P. Biswas, M.K. Khan, L. Leng, and N. Kumar, “Design of anonymity
preserving three-factor authenticated key exchange protocol for wireless sensor network,”Computer
Networks,Vol.2016, 2016, pp. 1-22.
[9] M.S. Farash, M. Turkanovic´, S. Kumari, and M. Hölbl, “An efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the internet of things
environment,”Ad Hoc Networks, Vol. 36, 2016, pp. 152-176.
[10 ]Y. Park, and Y.H. Park, “Three-Factor User Authentication and Key Agreement Using Elliptic Curve
Cryptosystem in Wireless Sensor Networks,” Sensors, Vol.16, No. 2123, 2016, pp. 1-17.
[11] Q. Jiang, S. Zeadally, J. Ma, and D. He, “Lightweight three factor authentication and key agreement
protocol for internet integrated wireless sensor networks,”IEEE Access, Vol. 5, 2017,pp. 3376–3392.
[12] J. Jung, J. Moon, D. Lee, and D. Won, “Efficient and Security Enhanced Anonymous Authentication
with Key Agreement Scheme in Wireless Sensor Networks,” Sensors, Vol. 17, No. 644, 2017, pp. 1-
21.
[13] I.P. Chang, T.F. Lee, T.H. Lin, and C.M. Liu, “Enhanced Two-Factor Authentication and Key
Agreement Using Dynamic Identities in Wireless Sensor Networks,” Sensors, Vol.15,2015, pp.
29841-29854.
[14] C. Wang, G. Xu, and J. Sun, “An Enhanced Three-Factor User Authentication Scheme Using Elliptic
Curve Cryptosystem for Wireless Sensor Networks,” Sensors, Vol.17, No. 2946, 2017, pp.
[15] X. Li, J. Niu, S. Kumari, F. Wu, A.K. Sangaiah, K. Kwang, and R. Choo, “Three-factor Anonymous
Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments,”Journal of
Network and Computer Applications, Vol. 103, 2017, pp. 194-204.
[16] K. Zhang, K. Xu, andF. Wei, “A Provably Secure Anonymous Authenticated Key Exchange Protocol
Based on ECC for Wireless Sensor Networks,”Wireless Communications and Mobile Computing,
Vol. 1028, 2018, pp. 1-9.
[17] K.E. Lauter, and K.E. Stange, “The elliptic curve discrete logarithm problem and equivalent hard
problems for elliptic divisibility sequences,” in Selected Areas in Cryptography, Springer, , 2009, pp.
309-327.
[18] I. Shparlinski, “Computational Diffie-Hellman Problem,” in Encyclopedia of Cryptography and
Security,H.C.A.Van Tilborg, and S. Jajodia, Eds., Springer, 2011.
20. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.5, September 2019
112
Anuj Kumar Singh is pursuing Ph.D. in Computer Science and Engineering from Dr.
A.P.J.Abdul Kalam Technical University, Lucknow (India). He is also working as
Assistant Professor in the Department of Computer Science & Engineering at Amity
University Haryana, Gurgaon (India). He passed M.Tech degree with honors from
Panjab University, Chandigarh. He has more than 15 years of teaching experience in
technical education. He has published 23 research papers in journals and conferences.
Dr.B.D.K.Patro earned Ph.D. degree in Computer Science from Institute of Computer
and Information Sciences, Dr.B.R.Ambedkar University, Agra. He is an Associate
Professor of Computer Science & Engineering at RajkiyaEngineeirng College,
Kannauj (India). He has more than 24 years of experience to teach the undergraduate
and postgraduate courses. He has guided 02 Ph.D, guiding 03 Ph.D candidates and he
supervised 12 M.Tech and many Undergraduate projects. He has published more than
30 research papers in journals and conferences.
.
[19] D. Boneh, “The Decision Diffie-Hellman problem,” in Algorithmic Number Theory, ANTS. Lecture
Notes in Computer Science, Volume 1423, J.P. Buhler, Ed., Springer, 1998.
[20] Y. Zheng, “Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) +
cost(encryption),”in Advances in Cryptology —CRYPTO 1997, Lecture Notes in Computer Science,
Volume 1294, B.S. Kaliski , Ed., Springer, 1997.
[21] Y. Zheng, and H. Imai, “How to Construct Efficient Signcryption Schemes on Elliptic
Curves,”Information Processing Letters, Vol. 68, No 5,1998, pp. 227 – 233.
AUTHORS