Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks

نویسندگان

چکیده

Since sensor nodes in wireless networks or Internet of things have limited resources, achieving secure data transmissions among is a challenge. Hence, efficient key management schemes with lightweight ciphers are essential. Many asymmetric keys public mechanisms been developed. However, they unsuitable for group communications networks, because usually devoid sufficient memory, CPU and bandwidth to deal complex operations. In addition, only few agreements integrated into transmissions. Therefore, agreement using the hierarchy-based cluster elliptic curve named HCECKA proposed this study networks. The presented security mechanism relies on curves instead logarithmic curves, utilises lesser length accomplish similar classification than Diffie-Hellman Rivest Shamir Adleman cryptosystems. Simultaneously, scheme provides rapid, dynamic synchronisation technique plenty no need reorganising whole system if members join leave

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network

In wireless sensor networks(WSN), because of the absence of physical protection and unattended deployment, the wireless connections are prone to different type of attacks. Hence, security is a measure concern in WSN. Moreover, the limited energy, memory and computation capability of sensor nodes, lead to difficulty in implementing security mechanisms effectively. In this paper we proposed an el...

متن کامل

Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in a...

متن کامل

Hierarchical Key Agreement Protocol for Wireless Sensor Networks

Wireless sensor network promises ubiquitous data collection and processing for variety of commercial, healthcare and military applications. Practical realization of WSN applications is possible only after assuring network security. Cryptographic key distribution is an important phase in network security which establishes initial trust in the network. Security protocol implementation in WSN is l...

متن کامل

An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks

The concept of forward secrecy is extended to wireless sensor networks where it is frequent that nodes run out of energy and new nodes join the network. However it should not be able to retrieve the previous session key or some crucial information. In 2011 Hagras et al. proposed a key management scheme for heterogeneous wireless sensor networks, which satisfies confidentiality, authentication, ...

متن کامل

Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks

Popularity of wireless sensor networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to the base station, while considering the severe energy constrai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Connection science

سال: 2021

ISSN: ['0954-0091', '1360-0494']

DOI: https://doi.org/10.1080/09540091.2021.1990212