The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Cryptography: Theory and Practice
Cryptography: Theory and Practice
SPINS: security protocols for sensor networks
Wireless Networks
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Generating RSA Keys on a Handheld Using an Untrusted Server
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Mutual Authentication for Low-Power Mobile Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
A high-speed ECC-based wireless authentication on an ARM microprocessor
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
SecLEACH-On the security of clustered sensor networks
Signal Processing
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
EURASIP Journal on Embedded Systems
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Multilayer key establishment for large-scale sensor networks
International Journal of Security and Networks
Design and implementation of a secure wireless mote-based medical sensor network
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
A scalable distributed security infrastructure for industrial control and sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
IEEE Transactions on Wireless Communications
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Scale-free, self-organizing very large sensor networks
Journal of Parallel and Distributed Computing
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
A method of pair-wise key distribution and management in distributed wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
ID-based authenticated key agreement for low-power mobile devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
In this paper, we consider efficient authenticated key establishment protocols between a sensor and a security manager in a self-organizing sensor network. We propose a hybrid authenticated key establishment scheme, which exploits the difference in capabilities between security managers and sensors, and put the cryptographic burden where the resources are less constrained. The hybrid scheme reduces the high cost public-key operations at the sensor side and replaces them with efficient symmetric-key based operations. Meanwhile, the scheme authenticates the two identities based on public-key certificates to avoid the typical key management problem in pure symmetric-key based protocols and maintain a good amount of scalability. The proposed scheme can be efficiently implemented on Mitsubishi's M16C microprocessor in 5.2Kbyte code/data size, and achieve a total processing time of 760 ms on sensor side, which is better than all the other public-key based key establishment protocols we have studied. We also present its modified version with a faster speed but more communication overhead.