Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
EURASIP Journal on Wireless Communications and Networking
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Hi-index | 0.00 |
This article describes an authentication protocol based on pairings for a wireless sensor network considering the execution cost. The proposed protocol provides a node authentication process based on identity, as well as a message authentication process using keyed hash functions. The evaluation of the protocol's execution cost is focused on message authentication operations in order to provide a notion of the network power consumption intensive message exchange between authenticated nodes.