ACM Transactions on Computer Systems (TOCS)
One way hash functions and DES
CRYPTO '89 Proceedings on Advances in cryptology
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
SPINS: security protocols for sensor networks
Wireless Networks
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Geographic routing without location information
Proceedings of the 9th annual international conference on Mobile computing and networking
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 1st international conference on Embedded networked sensor systems
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
IEEE Transactions on Consumer Electronics
IEEE Communications Magazine
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks
Proceedings of the second ACM conference on Wireless network security
Hi-index | 0.00 |
In wireless sensor networks, many sensor nodes form self-organizing wireless networks. The sensor nodes in these networks only have limited computation and communication capacity, storage and energy. In this paper, we propose a novel user authentication and key agreement scheme suitable for wireless sensor network environments. The main merits include: (1) the shared keys generation and management between all participants is flexible and simplified; (2) a sensor node only needs to register in a key center and can generate shared keys and exchange session keys with the other participants in the corresponding domain of the base station; (3) an installer can freely choose and change the password installed in a sensor node for protecting this node when it is installed or the battery of the node must be replaced; (4) the communication and computation cost is very low; (5) any two participants can authenticate each other; (6) it can generate a session key agreed by any two participants; (7) an installer can freely add new nodes to a sensor network after some nodes have already been installed in it; (8) our scheme is a nonce-based scheme which does not have a serious time-synchronization problem.