Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Elliptic Curves: Number Theory and Cryptography
Elliptic Curves: Number Theory and Cryptography
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
EURASIP Journal on Wireless Communications and Networking
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Hierarchical localization strategy for wireless sensor networks
WSEAS Transactions on Computers
The investigation of the elliptic curve cryptology applies to the new generation protocol
WSEAS Transactions on Computers
A new approach of secret key management lifecycle for military applications
WSEAS Transactions on Computers
A survey on wireless sensor networks deployment
WSEAS TRANSACTIONS on COMMUNICATIONS
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
IEEE Transactions on Information Theory
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
Hi-index | 0.00 |
This paper describes a solution for nodes and message authentication problems in wireless sensor networks, this solution allows effectively avoiding node-impersonation and messaging falsification among the WSN nodes. The resulting protocol address authentication at two level using identity based cryptography and message authentication codes with SHA-1, for node and message authentication respectively. An implementation of the message authentication process into a TinyOS-based node is presented; also power consumption measurements obtained are discussed. Based in experimental results we show that message authentication process is suitable in terms of power consumption.