Skip to main content

A Improved Certificate-Based Security Protocol for Wireless Sensor Networks

  • Conference paper
Future Wireless Networks and Information Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 143))

  • 2810 Accesses

Abstract

As the key technology of Pervasive computing, wireless sensor networks node is very limited in its energy, processing power, storage capacity and communications capability, so it’s usually to be considered unsuitable for the use of public key encryption technology. In our article, we propose mutual authentication and session key exchange protocols based on certificates for the wireless sensor networks, and an improved versions for the conventional certificate-based systems are proposed. Our protocol is more efficient than the others in that it requires fewer messages and only one session key. It gives use a new method to deal with such security problems. In designing the security protocol proposed here, the low computational power of the wireless sensors nodes and the low bandwidth of the wireless networks are considered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Mobile Computing and Networking (Mobi- Com 1999), Seattle, WA USA, pp. 263–270 (1999)

    Google Scholar 

  2. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  3. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Network Journal, Special Issue on Sensor Net. Applications and Protocols 1(2-3), 293–315 (2003)

    Google Scholar 

  4. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  5. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of computation 48, 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  6. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and Rsa on 8-bit Cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67 (2005)

    Google Scholar 

  8. Gentry, C.: Certificate-based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Wang, S.B., Cao, Z.F.: Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings. Wuhan University Journal of Natural Sciences 12, 63–66 (2007)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Yan, T., Wen, Q. (2012). A Improved Certificate-Based Security Protocol for Wireless Sensor Networks. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27323-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27322-3

  • Online ISBN: 978-3-642-27323-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics