Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management
Along with the many environmental changes, it enables a disasterÂ either natural or man-made objects. One of the efforts made toÂ prevent disasters from happening is to make a system that is able toÂ provide information about the status of the environment that isÂ around. Many developments in the sensor system makes it possibleÂ to load a system that will supply real-time on the status ofÂ environmental conditions with a good security system. This studyÂ created a supply system status data of environmental conditions,Â especially on bridges by using Ubiquitous Sensor Network. SensorÂ used to detect vibrations are using an accelerometer. Supply of dataÂ between sensors and servers using ZigBee communication protocolÂ wherein the data communication will be done using the Elliptic CurveÂ Integrated security mechanisms Encryption Scheme and on the use ofÂ Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test resultsÂ show the limitation of distance for communication is as far as 55Â meters, with the computation time for encryption and decryptionÂ with 97 and 42 seconds extra time for key exchange is done at theÂ beginning of communication .
Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Ubiquitous Sensor Netwoks(USN),ITU-T Technology Watch Briefing Report Series, No.4, February 2008.
Darrel Hankerson, Alfred J. Menezes, dan Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer, New York [u.a.], 2004.
Chae, M. J, Yoo, H. S.,Kim, J. R., Cho, M. Y., Bridge Condition Monitoring System Using Wireless Network (CDMA and ZigBee), Proceeding of ISARC, Korea,, 2006.
Malik, Muhammad Yasir, Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor, Proceeding of ICACT, Pakistan, 2010
Ronald Watro, Derrick Kong, Sue Fen Cuti, Charles Gardiner, Charles Lynn, dan Peter Kruus, TinyPK: Securing Sensor Networks with Public Key Technology, Dalam SASN â€™04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pages 59 64, New York, NY, USA, 2004. ACM Press.
M. Aydos, B. Sunar, dan C. K. Koc, An Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication, 2nd International Workshop on Discrete and Methods for Mobile Computing and Communications, Dallas, Texas, 1998.
L. Eschenauerdan V. Gligor, A Key Management Scheme for Distributed Sensor Networks, Dalam CCS â€™02: Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, NY, USA, 2002. ACM Press.
W. Du, J. Deng, Y. Han, dan P. Varshney, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,Dalam CCS â€™03: Proceedings of the 10th ACM Conference on Computer and Communications Security.
H. Chan, A. Perrig, dan D. Song, Random Key Predistribution Schemes for Sensor Networks,Dalam Proceedings of the IEEE Security and Privacy Symposium 2003.
Copyright (c) 2016 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Plagiarism screening will be conducted by EMITTER Journal Editorial Board using iThenticate Plagiarism Checker and CrossCheck plagiarism screening service. Author should download and signing declaration of plagiarism form here and resubmit it with copyright transfer form via online submission.