Public Key-based Session Key Establishment for Hierarchical Sensor Networks
نویسندگان
چکیده
Wireless sensor networks (WSNs) are expected to be utilized by internet of things (IoT) applications/services in various fields in the near future. However, studies on session key establishment between two nodes in WSNs are relatively recent compared to studies on long-term key establishment. This paper proposes a security and efficiency enhanced session key establishment scheme for hierarchical sensor networks in security-critical applications. The proposed scheme employs elliptic curve Diffie-Hellman key exchange (ECDH) and RSA signature verification to efficiently perform the most important security features of mutual authentication, verification of message integrity, and session key establishment.
منابع مشابه
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملEnergy Efficient Session Key Establishment in Wireless Sensor Networks
Key distribution and management is the foundation of any secure services of wireless sensor networks. Due to the resource constraints, establishing cryptographic keys between communicating sensors in large-scale wireless sensor networks is a big challenge. Traditional asymmetric key cryptography is not suitable for wireless sensor environment because of its complexity. Based on the polynomial-k...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملCBKE: Chord-based Key Establishment Schemes for Wireless Sensor Networks
Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between nodes. In order to use symmetric-key algorithms, two nodes need to establish a secret session key first. In this chapter, we describe a novel chord-based key establishment (CBKE) protocol that allows any pair of nodes in a...
متن کامل