Abstract
As the key technology of Pervasive computing, wireless sensor networks node is very limited in its energy, processing power, storage capacity and communications capability, so it’s usually to be considered unsuitable for the use of public key encryption technology. In our article, we propose mutual authentication and session key exchange protocols based on certificates for the wireless sensor networks, and an improved versions for the conventional certificate-based systems are proposed. Our protocol is more efficient than the others in that it requires fewer messages and only one session key. It gives use a new method to deal with such security problems. In designing the security protocol proposed here, the low computational power of the wireless sensors nodes and the low bandwidth of the wireless networks are considered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Mobile Computing and Networking (Mobi- Com 1999), Seattle, WA USA, pp. 263–270 (1999)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Network Journal, Special Issue on Sensor Net. Applications and Protocols 1(2-3), 293–315 (2003)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of computation 48, 203–209 (1987)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and Rsa on 8-bit Cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67 (2005)
Gentry, C.: Certificate-based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)
Wang, S.B., Cao, Z.F.: Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings. Wuhan University Journal of Natural Sciences 12, 63–66 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Yan, T., Wen, Q. (2012). A Improved Certificate-Based Security Protocol for Wireless Sensor Networks. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-27323-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27322-3
Online ISBN: 978-3-642-27323-0
eBook Packages: EngineeringEngineering (R0)