How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM - Special 25th Anniversary Issue
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
Decentralized Reactive Clustering for Collaborative Processing in Sensor Networks
ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
An efficient key predistribution scheme for ad hoc network security
IEEE Journal on Selected Areas in Communications
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust and secure routing scheme for wireless multihop network
Personal and Ubiquitous Computing
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Proceedings of the fourth ACM conference on Wireless network security
Error compensation algorithm in wireless sensor networks synchronisation
International Journal of Sensor Networks
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This paper adopts an ECC-based Diffie-Hellman (DH) self-certified key establishment methodologies for securing ad hoc clusters of sensor nodes. The results pertain to a novel load-balancing technique accompanied by a detailed communication protocol. PairwiseDHself-certified key-establishment procedures are extended to online group key generation. Linear computational complexity is observed with respect to the network size, yielding a highly scalable framework. Moreover, authentication is introduced as an inherent component in all key generation processes. Implementation results are presented for the TelosB sensor node platform, clearly demonstrating the viability of the proposed approach.