Abstract
Remote sensing infrastructures are now in widespread use to acquire detected information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station, as shown in Fig.1. Additionally, the carried information probably contains confidential data. However, the properties of wireless communications are vulnerable to an exposed environment. Hence, secure data transmissions for cooperative information integration in sensor networks are essential. In general, wireless sensor nodes have limited resources, and they cannot provide sufficient CPU, memory and bandwidth to address complex operations. The proposed scheme depends on Discrete Logarithm Problem (DLP) of Elliptic Curve Cryptography (ECC), and exploits a smaller key size to achieve comparable security levels than Rivest Shamir Adleman (RSA) and Diffie-Hellman (DH) cryptosystems. Consequently, this paper exploits Elliptic Curve Diffie-Hellman (ECDH) based security methods to achieve cooperative secure information integration.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Haodong, W., Bo, S., Qun, L.: Elliptic Curve Cryptography-based Access Control in Sensor Networks. International Journal of Security and Networks 1(3-4), 127–137 (2006)
Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, pp. 245–256 (2008)
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)
Certicom Research: Standards for Efficient Cryptography – SEC: Recommended Elliptic Curve Domain Parameters. pp. 628–639 (September 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, HY., Chiang, TC. (2009). Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2009. Lecture Notes in Computer Science, vol 5738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04265-2_58
Download citation
DOI: https://doi.org/10.1007/978-3-642-04265-2_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04264-5
Online ISBN: 978-3-642-04265-2
eBook Packages: Computer ScienceComputer Science (R0)