ارسل ملاحظاتك

ارسل ملاحظاتك لنا







A Secure Data Routing Schema for WSN Using Elliptic Curve Cryptography and Homomorphic Encryption

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Elhoseny, Mohamed (Author)
مؤلفين آخرين: Riad, Alaa (Co-Author) , Yuan, Xiaohui (Co-Author) , Elminir, Hamdy K. (Co-Author)
المجلد/العدد: مج28, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2016
الصفحات: 262 - 275
DOI: 10.33948/0584-028-003-003
ISSN: 1319-1578
رقم MD: 973913
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Wireless Sensor Networks | Data Encryption | Secure Clustering | Energy Consumption
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02515nam a22002657a 4500
001 1716768
024 |3 10.33948/0584-028-003-003 
041 |a eng 
044 |b السعودية 
100 |9 525172  |a Elhoseny, Mohamed  |e Author 
245 |a A Secure Data Routing Schema for WSN Using Elliptic Curve Cryptography and Homomorphic Encryption 
260 |b جامعة الملك سعود  |c 2016 
300 |a 262 - 275 
336 |a بحوث ومقالات  |b Article 
520 |b Despite the great efforts to secure wireless sensor network (WSN), the dynamic nature and the limited resources of sensor nodes make searching for a secure and optimal network structure an open challenge. In this paper, we propose a novel encryption schema based on Elliptic Curve Cryptography (ECC) and homomorphic encryption to secure data transmission in WSN. The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. ECC is used to exchange public and private keys due to its ability to provide high security with small key size. The proposed encryption key is 176-bit and is produced by combining the ECC key, node identification number, and distance to its cluster head (CH). To reduce energy consumption of CH, homomorphic encryption is used to allow CH to aggregate the encrypted data without having to decrypt them. We demonstrated that the proposed method is capable to work with different sensing environments that need to capture text data as well as images. Compared with the state-of-the-art methods, our experimental results demonstrated that our proposed method greatly improve the network performance in terms of lifetime, communication overhead, memory requirements, and energy consumption. 
653 |a الرسوم البيانية  |a التشفير  |a أمن المعلومات 
692 |b Wireless Sensor Networks  |b Data Encryption  |b Secure Clustering  |b Energy Consumption 
700 |9 45251  |a Riad, Alaa  |e Co-Author 
700 |9 525176  |a Yuan, Xiaohui  |e Co-Author 
700 |9 524930  |a Elminir, Hamdy K.  |e Co-Author 
773 |c 003  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 003  |m مج28, ع3  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 028  |x 1319-1578 
856 |u 0584-028-003-003.pdf 
930 |d y  |p y  |q n 
995 |a science 
999 |c 973913  |d 973913