Skip to main content

Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5738))

Abstract

Remote sensing infrastructures are now in widespread use to acquire detected information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station, as shown in Fig.1. Additionally, the carried information probably contains confidential data. However, the properties of wireless communications are vulnerable to an exposed environment. Hence, secure data transmissions for cooperative information integration in sensor networks are essential. In general, wireless sensor nodes have limited resources, and they cannot provide sufficient CPU, memory and bandwidth to address complex operations. The proposed scheme depends on Discrete Logarithm Problem (DLP) of Elliptic Curve Cryptography (ECC), and exploits a smaller key size to achieve comparable security levels than Rivest Shamir Adleman (RSA) and Diffie-Hellman (DH) cryptosystems. Consequently, this paper exploits Elliptic Curve Diffie-Hellman (ECDH) based security methods to achieve cooperative secure information integration.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haodong, W., Bo, S., Qun, L.: Elliptic Curve Cryptography-based Access Control in Sensor Networks. International Journal of Security and Networks 1(3-4), 127–137 (2006)

    Google Scholar 

  2. Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, pp. 245–256 (2008)

    Google Scholar 

  3. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Certicom Research: Standards for Efficient Cryptography – SEC: Recommended Elliptic Curve Domain Parameters. pp. 628–639 (September 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, HY., Chiang, TC. (2009). Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2009. Lecture Notes in Computer Science, vol 5738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04265-2_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04265-2_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04264-5

  • Online ISBN: 978-3-642-04265-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics