CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
APTC '08 Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
Security architecture for IEEE 802.15.4-based wireless sensor network
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
On the power consumption of security algorithms employed in wireless networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Hi-index | 0.00 |
Due to the increasing flexibility and the mobility, wireless security communication in the industrial control field is a challenging. In this paper, we propose one approach of security mutual authentication scheme with key agreement for WIA-PA networks, which is significant to security provisioning in industry wireless network with resource limitations. Then we implements the new node security join the network and communication to enhance the capacity of preventing the attacks. Based upon the provision concept, the proposed scheme does not require public keys for users such that the additional computations for certificates can be reduced. Finally, our test results show these security methods may be used in the field environment to realize the security reliability of the wireless industrial network communication.