Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks
نویسندگان
چکیده
Since sensor nodes in wireless networks or Internet of things have limited resources, achieving secure data transmissions among is a challenge. Hence, efficient key management schemes with lightweight ciphers are essential. Many asymmetric keys public mechanisms been developed. However, they unsuitable for group communications networks, because usually devoid sufficient memory, CPU and bandwidth to deal complex operations. In addition, only few agreements integrated into transmissions. Therefore, agreement using the hierarchy-based cluster elliptic curve named HCECKA proposed this study networks. The presented security mechanism relies on curves instead logarithmic curves, utilises lesser length accomplish similar classification than Diffie-Hellman Rivest Shamir Adleman cryptosystems. Simultaneously, scheme provides rapid, dynamic synchronisation technique plenty no need reorganising whole system if members join leave
منابع مشابه
An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network
In wireless sensor networks(WSN), because of the absence of physical protection and unattended deployment, the wireless connections are prone to different type of attacks. Hence, security is a measure concern in WSN. Moreover, the limited energy, memory and computation capability of sensor nodes, lead to difficulty in implementing security mechanisms effectively. In this paper we proposed an el...
متن کاملThree-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in a...
متن کاملHierarchical Key Agreement Protocol for Wireless Sensor Networks
Wireless sensor network promises ubiquitous data collection and processing for variety of commercial, healthcare and military applications. Practical realization of WSN applications is possible only after assuring network security. Cryptographic key distribution is an important phase in network security which establishes initial trust in the network. Security protocol implementation in WSN is l...
متن کاملAn Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
The concept of forward secrecy is extended to wireless sensor networks where it is frequent that nodes run out of energy and new nodes join the network. However it should not be able to retrieve the previous session key or some crucial information. In 2011 Hagras et al. proposed a key management scheme for heterogeneous wireless sensor networks, which satisfies confidentiality, authentication, ...
متن کاملSecure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks
Popularity of wireless sensor networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to the base station, while considering the severe energy constrai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Connection science
سال: 2021
ISSN: ['0954-0091', '1360-0494']
DOI: https://doi.org/10.1080/09540091.2021.1990212