Elliptic curve cryptography with security system in wireless sensor networks

Research output: A Conference proceeding or a Chapter in BookChapter

Abstract

The rapid progress of wireless communications and embedded micro‐electro‐system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application’s requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today’s software applications are mainly characterized by their component‐based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man‐in‐the middle attack and (c) we first investigates multi‐agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre‐computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man‐in‐the middle attack. A designed a hidden generator point that offer a good protection from the man‐in‐the middle (MinM) attack which becomes one of major worries for the sensor’s networks with multiagent system is also discussed.
Original languageEnglish
Title of host publicationIAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010
EditorsSio-Iong Ao, Hideki Katagir, Li Xu, Alan Hoi-Shou Chan
Place of PublicationNew York, USA
PublisherAmerican Institute of Physics
Pages519-531
Number of pages13
Edition1
ISBN (Print)9780735408395
DOIs
Publication statusPublished - 2010

Fingerprint

Security systems
Cryptography
Wireless sensor networks
Sensor networks
Sensors
Bandwidth
Communication
Multi agent systems
Application programs
Scalability
Decision making
Availability
Hardware
Data storage equipment
Controllers
Costs

Cite this

Huang, X., & Sharma, D. (2010). Elliptic curve cryptography with security system in wireless sensor networks. In S-I. Ao, H. Katagir, L. Xu, & A. H-S. Chan (Eds.), IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010 (1 ed., pp. 519-531). New York, USA: American Institute of Physics. https://doi.org/10.1063/1.3510575
Huang, Xu ; Sharma, Dharmendra. / Elliptic curve cryptography with security system in wireless sensor networks. IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010. editor / Sio-Iong Ao ; Hideki Katagir ; Li Xu ; Alan Hoi-Shou Chan. 1. ed. New York, USA : American Institute of Physics, 2010. pp. 519-531
@inbook{f7610aeff1194c3d9ad0164593dbbff6,
title = "Elliptic curve cryptography with security system in wireless sensor networks",
abstract = "The rapid progress of wireless communications and embedded micro‐electro‐system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application’s requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today’s software applications are mainly characterized by their component‐based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man‐in‐the middle attack and (c) we first investigates multi‐agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre‐computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man‐in‐the middle attack. A designed a hidden generator point that offer a good protection from the man‐in‐the middle (MinM) attack which becomes one of major worries for the sensor’s networks with multiagent system is also discussed.",
author = "Xu Huang and Dharmendra Sharma",
year = "2010",
doi = "10.1063/1.3510575",
language = "English",
isbn = "9780735408395",
pages = "519--531",
editor = "Sio-Iong Ao and Hideki Katagir and Li Xu and Chan, {Alan Hoi-Shou}",
booktitle = "IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010",
publisher = "American Institute of Physics",
address = "United States",
edition = "1",

}

Huang, X & Sharma, D 2010, Elliptic curve cryptography with security system in wireless sensor networks. in S-I Ao, H Katagir, L Xu & AH-S Chan (eds), IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010. 1 edn, American Institute of Physics, New York, USA, pp. 519-531. https://doi.org/10.1063/1.3510575

Elliptic curve cryptography with security system in wireless sensor networks. / Huang, Xu; Sharma, Dharmendra.

IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010. ed. / Sio-Iong Ao; Hideki Katagir; Li Xu; Alan Hoi-Shou Chan. 1. ed. New York, USA : American Institute of Physics, 2010. p. 519-531.

Research output: A Conference proceeding or a Chapter in BookChapter

TY - CHAP

T1 - Elliptic curve cryptography with security system in wireless sensor networks

AU - Huang, Xu

AU - Sharma, Dharmendra

PY - 2010

Y1 - 2010

N2 - The rapid progress of wireless communications and embedded micro‐electro‐system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application’s requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today’s software applications are mainly characterized by their component‐based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man‐in‐the middle attack and (c) we first investigates multi‐agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre‐computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man‐in‐the middle attack. A designed a hidden generator point that offer a good protection from the man‐in‐the middle (MinM) attack which becomes one of major worries for the sensor’s networks with multiagent system is also discussed.

AB - The rapid progress of wireless communications and embedded micro‐electro‐system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application’s requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today’s software applications are mainly characterized by their component‐based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man‐in‐the middle attack and (c) we first investigates multi‐agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre‐computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man‐in‐the middle attack. A designed a hidden generator point that offer a good protection from the man‐in‐the middle (MinM) attack which becomes one of major worries for the sensor’s networks with multiagent system is also discussed.

U2 - 10.1063/1.3510575

DO - 10.1063/1.3510575

M3 - Chapter

SN - 9780735408395

SP - 519

EP - 531

BT - IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010

A2 - Ao, Sio-Iong

A2 - Katagir, Hideki

A2 - Xu, Li

A2 - Chan, Alan Hoi-Shou

PB - American Institute of Physics

CY - New York, USA

ER -

Huang X, Sharma D. Elliptic curve cryptography with security system in wireless sensor networks. In Ao S-I, Katagir H, Xu L, Chan AH-S, editors, IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010. 1 ed. New York, USA: American Institute of Physics. 2010. p. 519-531 https://doi.org/10.1063/1.3510575