Cooperative public key authentication protocol in wireless sensor network

Dae Hun Nyang, Abedelaziz Mohaisen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations


Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it's used. We believe that sooner or later, PKC will be widely deployed in WSN. Therefore, we present a cooperative distributed public key authentication scheme that does not require any cryptographic overhead. In our scheme, each node is let to store a few number of hashed keys for other nodes. When a public key authentication is required, nodes who store this key help in authenticating it in a distributed and cooperative way. We consider the constrained resources of the sensor node. Additionally, we extend our scheme to fit with small range of authentication error.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings
PublisherSpringer Verlag
Number of pages10
ISBN (Print)3540380914, 9783540380917
StatePublished - 2006
Event3rd International Conference on Ubiquitous Intelligence and Computing, UIC 2006 - Wuhan, China
Duration: 3 Sep 20066 Sep 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4159 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference3rd International Conference on Ubiquitous Intelligence and Computing, UIC 2006


  • Cooperative Protocol
  • Public Key Authentication
  • Voting


Dive into the research topics of 'Cooperative public key authentication protocol in wireless sensor network'. Together they form a unique fingerprint.

Cite this