A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks

Public key cryptography has been playing an important and vital role in providing security in various domains including secure electronic transactions in distributed environment and secure communication between different nodes in a wireless ad-hoc network. The security in wireless sensor networks is currently provided mostly through symmetric key cryptography. The proposed protocols in this domain are mainly based on the idea of keys before the deployment of the wireless sensor network. However, due to the limitation on memory resources of wireless sensor nodes, these protocols are not able to achieve perfect security and also face a key management problem in large scale wireless sensor networks. On the other hand asymmetric key cryptography offers flexibility to node and clean interface for the security component in the sensor network. This paper proposes a new mutual authentication and key management scheme for a particular session between any two corresponding nodes of a wireless sensor network based o...

[1]  Kamran Sayrafian-Pour,et al.  Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile Sensors , 2014, IEEE Transactions on Industrial Informatics.

[2]  Kakali Chatterjee,et al.  Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices , 2013, Int. J. Netw. Secur..

[3]  Indranil Sengupta,et al.  Secured hierarchical secret sharing using ECC based signcryption , 2012, Secur. Commun. Networks.

[4]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[5]  Reza Azarderakhsh,et al.  Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[6]  Indranil Sengupta,et al.  Improved secure dynamic key management scheme with access control in user hierarchy , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[7]  Toyoo Takata,et al.  Reducing data leakage possibility resulted from eavesdropping in wireless sensor network , 2013, Int. J. Space Based Situated Comput..

[8]  Khaled M. Elleithy,et al.  LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks , 2013, 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications.

[9]  Hervé Guyennet,et al.  Security in wireless sensor networks: a survey of attacks and countermeasures , 2011, Int. J. Space Based Situated Comput..

[10]  Mohamad Naufal bin Mohamad Saad,et al.  Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks , 2013, Int. J. Grid Util. Comput..

[11]  Xu Huang,et al.  Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[12]  Jalel Ben-Othman,et al.  Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).