A node authentication protocol based on ECC in WSN

This paper improves an authentication protocol based on The Elliptic curve Cryptography, and applies it to WSNs. This scheme contains system initialization, node registration and authentication phase. It continues to use the primary scheme's high efficient multiplication operation method, and the sensor node store the other ID's hash value as the premise of the authentication. Besides, this scheme increases an authentication phase between sensor nodes using The XKAS Key Agreement Scheme. Conclusion shows that the improved agreement has lower consumption for wireless sensor network.

[1]  Wang Wei-hong,et al.  The study and application of elliptic curve cryptography library on wireless sensor network , 2008, 2008 11th IEEE International Conference on Communication Technology.

[2]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[3]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[4]  Shi Hao-shan Cluster-Based Strategies for Public Key Authentication in Wireless Sensor Networks , 2007 .

[5]  Guillermo A. Francia A Wireless Sensor Network , 2003, International Conference on Wireless Networks.

[6]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[7]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).