Skip to main content

Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks

  • Conference paper
Wireless Mobile Communication and Healthcare (MobiHealth 2012)

Abstract

The rapid development in the Wireless Sensor Networks (WSNs) filed has allowed this technology to be used in many applications. In some of these applications, wireless sensor devices must be secured, especially when the captured information is valuable, sensitive, or for military usage. However, the implementation of security mechanisms on WSNs is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography algorithms for WSNs. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above said challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy used by a node, so there is a need to minimize the energy consumption of any security algorithm that will be implemented in WSNs. As a solution, we apply an additive homomorphic encryption scheme, namely the elliptic curve ElGamal (EC-ElGamal) cryptosystem, and present the performance results of our implementation for the prominent sensor platform MicaZ mote.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertoni, G., Breveglieri, L., Venturi, M.: Power aware design of an elliptic curve coprocessor for 8 bit platforms. In: PERCOMW 2006, p. 337 (2006)

    Google Scholar 

  2. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: PERCOM 2005, pp. 324–328 (2005)

    Google Scholar 

  3. Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. In: IEEE TMC 2005, pp. 128–143 (2005)

    Google Scholar 

  4. Chang, C.-C., Muftic, S., Nagel, D.J.: Measurement of energy costs of security in wireless sensor nodes. In: ICCCN 2007, pp. 95–102 (2007)

    Google Scholar 

  5. Weimerskirch, A., Westhoff, D.: Zero Common-Knowledge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Weimerskirch, A., Westhoff, D.: Identity Certified Authentication for Ad-hoc Networks. In: 10th Workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  7. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in adhoc wireless networks. In: Symposium on Network and Distributed Systems Security (2002)

    Google Scholar 

  8. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Capirci, E.: Wireless Sensor Networks: a Survey. Computer Networks 38(4) (March 2002)

    Google Scholar 

  9. Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications 11(6), 54–61 (2004)

    Article  Google Scholar 

  10. Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proc. ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97 (2002)

    Google Scholar 

  11. Werner-Allen, G., Johnson, J., Ruiz, M., Lees, J., Welsh, M.: Monitoring volcanic eruptions with a wireless sensor network. In: Proceeedings of the Wireless Sensor Networks, pp. 108–120 (2005)

    Google Scholar 

  12. Lee, K.B., Reichardt, M.E.: Open standards for homeland security sensor networks. IEEE Magazine on Instrumentation & Measurement 8(5), 14–21 (2005)

    Article  Google Scholar 

  13. Baldus, H., Klabunde, K., Müsch, G.: Reliable Set-Up of Medical Body-Sensor Networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Alippi, C., Galperti, C.: An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes. IEEE Transactions on Circuits and Systems I: Regular Papers 55(6), 1742–1750 (2008)

    Article  MathSciNet  Google Scholar 

  15. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. In: Proceedings of 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), pp. 139–144 (2002)

    Google Scholar 

  16. Carman, D.W., Krus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security., Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD (2009)

    Google Scholar 

  17. Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. ACMOSR: ACM Operating Systems Review (1998)

    Google Scholar 

  18. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys 2004, November 3-5 (2004)

    Google Scholar 

  19. Xiao, Y. (ed.): Wireless Sensor Network Security: A Survey. Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications, CRC Press (2006)

    Google Scholar 

  20. Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Mobile Computing and Networking, pp. 263–270 (1999)

    Google Scholar 

  21. Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243–254. ACM Press (2000)

    Google Scholar 

  22. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  23. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: 3rd AT&T Software Symposium, Middletown, NJ (October 1999)

    Google Scholar 

  24. Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A tiny aggregation service for ad-hoc sensor networks. In: The Fifth Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)

    Google Scholar 

  25. Wagner, C.K.D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    Google Scholar 

  26. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384 (June 2002)

    Google Scholar 

  27. Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In: International Conference on Wireless Sensor Networks and Applications (2003)

    Google Scholar 

  28. Huang, Q., Kobayashi, H.: Energy/security scalable mobile cryptosystem. IEEE Personal, Indoor and Mobile Radio Communications (2003)

    Google Scholar 

  29. Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, S.: Embedded End-to-End Wireless Security with ECDH Key Exchange. In: The 46th IEEE Midwest Symposium on Circuits and Systems (2003)

    Google Scholar 

  30. Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (2004)

    Google Scholar 

  31. Lorincz, K., Malan, D.J., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Moulton, S., Welsh, M.: Sensor Networks for Emergency Response: Challenges and Opportunities. IEEE Pervasive Computing (2004)

    Google Scholar 

  32. El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  33. http://www.tinyos.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Othman, S.B., Trad, A., Alzaid, H., Youssef, H. (2013). Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks. In: Godara, B., Nikita, K.S. (eds) Wireless Mobile Communication and Healthcare. MobiHealth 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 61. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37893-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37893-5_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37892-8

  • Online ISBN: 978-3-642-37893-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics