A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks

被引:0
|
作者
Louw, J. [1 ]
Niezen, G. [1 ]
Ramotsoela, T. D. [1 ]
Abu-Mahfouz, A. M. [2 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa
[2] CSIR, Meraka Inst, POB 395, ZA-0001 Pretoria, South Africa
关键词
wireless sensor networks; key distribution; authentication; network security; elliptic curve cryptography; SECURITY; IMPLEMENTATIONS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have become increasingly popular in many applications across a broad range of fields. Securing WSNs poses unique challenges mainly due to their resource constraints. Traditional public key cryptography (PKC) for instance is considered to be too computationally expensive for direct implementation in WSNs. Elliptic curve cryptography (ECC) allows one to reach the same level of security as traditional PKC using smaller key sizes. In this paper, a key distribution protocol was designed to securely provide authenticated motes with secret system keys using ECC based cryptographic functions. The designed scheme met the minimum requirements for a key distribution scheme to be considered secure and efficient in WSNs.
引用
收藏
页码:1166 / 1170
页数:5
相关论文
共 50 条
  • [31] A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks
    Chuang, Po-Jen
    Chang, Shao-Hsuan
    Lin, Chih-Shin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1859 - 1873
  • [32] A Key Distribution Scheme for Wireless Sensor Networks using Normal Curves
    Yu, Wangke
    Ma, Wenping
    Wang, Shuhua
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 77 - 80
  • [33] New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography
    Hamed, Amr I.
    El-Khamy, Said E.
    NRSC: 2009 NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2009, VOLS 1 AND 2, 2009, : 454 - 466
  • [34] Centralised conference key mechanism with elliptic curve cryptography and Lagrange interpolation for sensor networks
    Deng, D. -J.
    Guo, M. -H.
    IET COMMUNICATIONS, 2011, 5 (12) : 1727 - 1731
  • [35] Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context
    Bettoumi, Balkis
    Bouallegue, Ridha
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 258 - 262
  • [36] ELLIPTIC CURVE CRYPTOGRAPHY SENSOR NETWORKS WITH OPTIMUM CONTROLLING
    Huang, Xu
    Sharma, Dharmendra
    IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES, VOL 7, 2012, : 374 - 388
  • [37] A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    AD HOC NETWORKS, 2015, 32 : 98 - 113
  • [38] On the Practicality of Elliptic Curve Cryptography for Medical Sensor Networks
    Baehr, Dan
    McKinney, Steve
    Quirk, Aaron
    Harfoush, Khaled
    2014 11TH ANNUAL HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (PHOTONICS FOR ENERGY), 2014, : 41 - 45
  • [39] Application of elliptic curve cryptography in ZigBee wireless sensor network
    1600, International Frequency Sensor Association, 46 Thorny Vineway, Toronto, ON M2J 4J2, Canada (21):
  • [40] Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks
    Viswanathan, S.
    Kannan, A.
    WIRELESS NETWORKS, 2019, 25 (08) : 4903 - 4914