e-ISSN : 0975-4024 p-ISSN : 2319-8613   
CODEN : IJETIY    

International Journal of Engineering and Technology

Home
IJET Topics
Call for Papers 2021
Author Guidelines
Special Issue
Current Issue
Articles in Press
Archives
Editorial Board
Reviewer List
Publication Ethics and Malpractice statement
Authors Publication Ethics
Policy of screening for plagiarism
Open Access Statement
Terms and Conditions
Contact Us

ABSTRACT

ISSN: 0975-4024

Title : Mutual Authentication of Nodes in WSN using Migrated ECC of Asymmetric Key
Authors : B. TAMILARASI, DR. R. UMARANI
Keywords : Wireless Sensor Networks, Mutual Authentication, Security Attack, Migrated ECC.
Issue Date : Dec 2017-Jan 2018
Abstract :
Wireless Sensor Networks (WSNs) are a promising innovation for a few modern and everyday applications. The advancement of remote sensor systems was spurred for use in reconnaissance in a war zone by military applications. These days WSN systems are utilized as a part of modern industrial applications for monitor and control the process flow, to monitor machine health, in consumer applications and so on. A couple to a few a huge number of junctions are comprised in WSN, where every junction is associated with one or now and again more sensors. There is a need for an approach that prevents unauthorized nodes from using the network to communicate the legitimate nodes or Internet. This will probably reduce most of the security attacks that can be happened. Some systems use Elliptic Curve Cryptography(ECC) for authentication process, because small size of key used for encryption. However, ECC have some disadvantages. The primary problem in ECC is, it significantly makes encrypted message greater in size which makes this mechanism more complex. Furthermore, it is difficult to implement when compared to other public key encryption techniques and also it provides less security alone. To overcome difficulties in ECC, this system introduces Migrated ECC that uses asymmetric key. This system consist of node registration, distribution of authorized node list to all legitimate nodes, and mutual authentication of nodes in different networks, and handover of node from one network to other. From our assumption, it proves that Migrated ECC performs better than ECC in terms of security and efficiency.
Page(s) : 4007-4011
ISSN : 0975-4024 (Online) 2319-8613 (Print)
Source : Vol. 9, No.6
PDF : Download
DOI : 10.21817/ijet/2017/v9i6/170906307