Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A noble key pre-distribution scheme with LU matrix for secure wireless sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
New directions in cryptography
IEEE Transactions on Information Theory
IEEE Communications Magazine
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
A review of wireless sensors and networks' applications in agriculture
Computer Standards & Interfaces
Hi-index | 0.00 |
Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. Therefore, new node deployment is necessary. Based on elliptic curve cryptography (ECC), this paper presents a new access control protocol for secure wireless sensor networks. The authentication procedure and common key generation are very simple and efficient. It is quite adequate for power and resource constrained sensor nodes. In addition, the proposed scheme can be easily implemented as a dynamic access control because all the old secret keys and broadcasting information in existing nodes should not be updated once a new node is added.