A Improved Certificate-Based Security Protocol for Wireless Sensor Networks
As the key technology of Pervasive computing, wireless sensor networks node is very limited in its energy, processing power, storage capacity and communications capability, so it’s usually to be considered unsuitable for the use of public key encryption technology. In our article, we propose mutual authentication and session key exchange protocols based on certificates for the wireless sensor networks, and an improved versions for the conventional certificate-based systems are proposed. Our protocol is more efficient than the others in that it requires fewer messages and only one session key. It gives use a new method to deal with such security problems. In designing the security protocol proposed here, the low computational power of the wireless sensors nodes and the low bandwidth of the wireless networks are considered.
KeywordsWireless sensor networks Certificate-based encryption bilinear pairings
Unable to display preview. Download preview PDF.
- 1.Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Mobile Computing and Networking (Mobi- Com 1999), Seattle, WA USA, pp. 263–270 (1999)Google Scholar
- 3.Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Network Journal, Special Issue on Sensor Net. Applications and Protocols 1(2-3), 293–315 (2003)Google Scholar
- 4.Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
- 7.Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67 (2005)Google Scholar