Secure Group Communication Using Elliptic Curve Cryptography in WSN

Authors(3) :-Binu Ruby Sunny, P. Parthasarathi, Prof. S. Shankar

Sensor devices are vulnerable of malicious attacks. These kinds of attacks extract the most confidential information which is exchanged between the devices. In order to protect these kinds of data, it must be secured from view. The mechanism of protecting the data is done by cryptographic procedures. Many type of attack is executed by taking the node identity as input parameter. By taking the advantage of hiding the identity information from packet is lead to protect and prevent the malicious attacks during communication. To establish this type of communication strategy, anonymous communication is used which takes the secured parameter as input instead of node identity. Key updation is the second most important factor which makes the communication is secured. The key must be updated during two situations for all users in the secured group. The two situations are, user joins in group, user leaves from group.

Authors and Affiliations

Binu Ruby Sunny
PG Scholar, Department of CSE, Akshaya College of Engineering and Technology, Malumichampatti, Tamil Nadu, India
P. Parthasarathi
Assistant Professor, Department of CSE, Akshaya College of Engineering and Technology, Malumichampatti, Tamil Nadu, India
Prof. S. Shankar
Professor and Head, Department of CSE, Hindustan College of Engineering and Technology, Malumichampatti, Tamil Nadu, India

Sensors, Key Updation, Secure Communication.

  1. Anoop , M. (2007). Elliptic curve cryptography , an implementation guide.X. ANSI (1998). 63: Public key cryptography for the financial services industry, key agreement and key transport using elliptic curve cryptography. American National Standards Institute.
  2. Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys.
  3. J. Shen, H. W. Tan, J. Wang, J. W. Wang, and S. Y. Lee, “A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks,”
  4. Z.H. Xia, X.H. Wang, X.M. Sun, and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,”
  5. Z.L. Liu, T. Li, P. Li, and et al., “Verifiable Searchable Encryption with Aggregate Keys for Data Sharing System,” Future Generation Computer Systems, accepted 12 February 2017
  6. C.K. Chu, S.S.M. Chow, W.G. Tzeng, J. Zhou, and R.H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 468-477, Feb. 2014
  7. B.J. Cui, Z.L. Liu, and L.Y. Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2374-2385, Aug. 2016
  8. Y. Sun and K.J.R. Liu, “Scalable Hierarchical Access Control in Secure Group Communications,” Proc. IEEE INFOCOM ’04, Hong Kong, China, 2004, pp. 1296-1306.

Publication Details

Published in : Volume 1 | Issue 4 | November-December 2018
Date of Publication : 2018-12-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 50-54
Manuscript Number : SHISRRJ181411
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

Binu Ruby Sunny, P. Parthasarathi, Prof. S. Shankar , "Secure Group Communication Using Elliptic Curve Cryptography in WSN", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 1, Issue 4, pp.50-54, November-December.2018
URL : https://shisrrj.com/SHISRRJ181411

Article Preview