Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Hi-index | 0.00 |
In 2003, Huang et al. proposed an authenticated key exchange (AKE) protocol for secure communications between a sensor and a security manager based on elliptic curve cryptography in a self-organizing sensor network. In 2005, Tian et al., however, showed that a security manager will learn the long-term private key of a sensor after having one normal run of the protocol with the sensor. Then they proposed an improvement which solves the problem. The current paper, however, demonstrates neither protocol provides perfect forward secrecy, and presents an improved protocol in order to address this problem. Not only is the computational cost of the proposed AKE protocol less than that of both protocols, the number of steps in communication is one fewer than conventional protocols and only needs three steps.