Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
On the security of public key protocols
On the security of public key protocols
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Hi-index | 0.00 |
Public key cryptography based on elliptic curves is a promising foundation for energy-scarving pairwise key establishment in wireless sensor networks. Focusing on the Diffie-Hellman key-agreement, identity-based schemes can be applied to provide mechanisms for authentication. The AQ-protocol presented by Arazi et al. introduces such a key establishment supporting fixed as well as ephemeral keys. In this paper we review two known attacks of the ephemeral key establishment of this protocol. We introduce a new ephemeral key establishment for the AQ-protocol to fix these problems and analyze the proposed approach from a security perspective. We illustrate its feasibility for wireless sensor networks by presenting implementation results for the MICAz platform using TinyOS 2.x.