Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management

  • Ismed Jauhar Politeknik Elektronika Negeri Surabaya
  • Amang Sudarsono Politeknik Elektronika Negeri Surabaya
  • Mike Yuliana Politeknik Elektronika Negeri Surabaya


Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .

Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone


Download data is not yet available.


Ubiquitous Sensor Netwoks(USN),ITU-T Technology Watch Briefing Report Series, No.4, February 2008.

Darrel Hankerson, Alfred J. Menezes, dan Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer, New York [u.a.], 2004.

Chae, M. J, Yoo, H. S.,Kim, J. R., Cho, M. Y., Bridge Condition Monitoring System Using Wireless Network (CDMA and ZigBee), Proceeding of ISARC, Korea,, 2006.

Malik, Muhammad Yasir, Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor, Proceeding of ICACT, Pakistan, 2010

Ronald Watro, Derrick Kong, Sue Fen Cuti, Charles Gardiner, Charles Lynn, dan Peter Kruus, TinyPK: Securing Sensor Networks with Public Key Technology, Dalam SASN ’04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pages 59 64, New York, NY, USA, 2004. ACM Press.

M. Aydos, B. Sunar, dan C. K. Koc, An Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication, 2nd International Workshop on Discrete and Methods for Mobile Computing and Communications, Dallas, Texas, 1998.

L. Eschenauerdan V. Gligor, A Key Management Scheme for Distributed Sensor Networks, Dalam CCS ’02: Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, NY, USA, 2002. ACM Press.

W. Du, J. Deng, Y. Han, dan P. Varshney, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,Dalam CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security.

H. Chan, A. Perrig, dan D. Song, Random Key Predistribution Schemes for Sensor Networks,Dalam Proceedings of the IEEE Security and Privacy Symposium 2003.

How to Cite
Jauhar, I., Sudarsono, A., & Yuliana, M. (2013). Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management. EMITTER International Journal of Engineering Technology, 1(1).