Abstract
The rapid development in the Wireless Sensor Networks (WSNs) filed has allowed this technology to be used in many applications. In some of these applications, wireless sensor devices must be secured, especially when the captured information is valuable, sensitive, or for military usage. However, the implementation of security mechanisms on WSNs is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography algorithms for WSNs. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above said challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy used by a node, so there is a need to minimize the energy consumption of any security algorithm that will be implemented in WSNs. As a solution, we apply an additive homomorphic encryption scheme, namely the elliptic curve ElGamal (EC-ElGamal) cryptosystem, and present the performance results of our implementation for the prominent sensor platform MicaZ mote.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Bertoni, G., Breveglieri, L., Venturi, M.: Power aware design of an elliptic curve coprocessor for 8 bit platforms. In: PERCOMW 2006, p. 337 (2006)
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: PERCOM 2005, pp. 324–328 (2005)
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. In: IEEE TMC 2005, pp. 128–143 (2005)
Chang, C.-C., Muftic, S., Nagel, D.J.: Measurement of energy costs of security in wireless sensor nodes. In: ICCCN 2007, pp. 95–102 (2007)
Weimerskirch, A., Westhoff, D.: Zero Common-Knowledge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)
Weimerskirch, A., Westhoff, D.: Identity Certified Authentication for Ad-hoc Networks. In: 10th Workshop on Security of Ad Hoc and Sensor Networks (2003)
Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in adhoc wireless networks. In: Symposium on Network and Distributed Systems Security (2002)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Capirci, E.: Wireless Sensor Networks: a Survey. Computer Networks 38(4) (March 2002)
Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications 11(6), 54–61 (2004)
Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proc. ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97 (2002)
Werner-Allen, G., Johnson, J., Ruiz, M., Lees, J., Welsh, M.: Monitoring volcanic eruptions with a wireless sensor network. In: Proceeedings of the Wireless Sensor Networks, pp. 108–120 (2005)
Lee, K.B., Reichardt, M.E.: Open standards for homeland security sensor networks. IEEE Magazine on Instrumentation & Measurement 8(5), 14–21 (2005)
Baldus, H., Klabunde, K., Müsch, G.: Reliable Set-Up of Medical Body-Sensor Networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)
Alippi, C., Galperti, C.: An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes. IEEE Transactions on Circuits and Systems I: Regular Papers 55(6), 1742–1750 (2008)
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. In: Proceedings of 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), pp. 139–144 (2002)
Carman, D.W., Krus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security., Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD (2009)
Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. ACMOSR: ACM Operating Systems Review (1998)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys 2004, November 3-5 (2004)
Xiao, Y. (ed.): Wireless Sensor Network Security: A Survey. Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications, CRC Press (2006)
Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Mobile Computing and Networking, pp. 263–270 (1999)
Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243–254. ACM Press (2000)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: 3rd AT&T Software Symposium, Middletown, NJ (October 1999)
Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A tiny aggregation service for ad-hoc sensor networks. In: The Fifth Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)
Wagner, C.K.D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384 (June 2002)
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In: International Conference on Wireless Sensor Networks and Applications (2003)
Huang, Q., Kobayashi, H.: Energy/security scalable mobile cryptosystem. IEEE Personal, Indoor and Mobile Radio Communications (2003)
Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, S.: Embedded End-to-End Wireless Security with ECDH Key Exchange. In: The 46th IEEE Midwest Symposium on Circuits and Systems (2003)
Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (2004)
Lorincz, K., Malan, D.J., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Moulton, S., Welsh, M.: Sensor Networks for Emergency Response: Challenges and Opportunities. IEEE Pervasive Computing (2004)
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Othman, S.B., Trad, A., Alzaid, H., Youssef, H. (2013). Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks. In: Godara, B., Nikita, K.S. (eds) Wireless Mobile Communication and Healthcare. MobiHealth 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 61. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37893-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-37893-5_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37892-8
Online ISBN: 978-3-642-37893-5
eBook Packages: Computer ScienceComputer Science (R0)