TY - GEN
T1 - Cooperative public key authentication protocol in wireless sensor network
AU - Nyang, Dae Hun
AU - Mohaisen, Abedelaziz
PY - 2006
Y1 - 2006
N2 - Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it's used. We believe that sooner or later, PKC will be widely deployed in WSN. Therefore, we present a cooperative distributed public key authentication scheme that does not require any cryptographic overhead. In our scheme, each node is let to store a few number of hashed keys for other nodes. When a public key authentication is required, nodes who store this key help in authenticating it in a distributed and cooperative way. We consider the constrained resources of the sensor node. Additionally, we extend our scheme to fit with small range of authentication error.
AB - Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it's used. We believe that sooner or later, PKC will be widely deployed in WSN. Therefore, we present a cooperative distributed public key authentication scheme that does not require any cryptographic overhead. In our scheme, each node is let to store a few number of hashed keys for other nodes. When a public key authentication is required, nodes who store this key help in authenticating it in a distributed and cooperative way. We consider the constrained resources of the sensor node. Additionally, we extend our scheme to fit with small range of authentication error.
KW - Cooperative Protocol
KW - Public Key Authentication
KW - Voting
UR - http://www.scopus.com/inward/record.url?scp=33750059455&partnerID=8YFLogxK
U2 - 10.1007/11833529_88
DO - 10.1007/11833529_88
M3 - Conference contribution
AN - SCOPUS:33750059455
SN - 3540380914
SN - 9783540380917
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 864
EP - 873
BT - Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings
PB - Springer Verlag
T2 - 3rd International Conference on Ubiquitous Intelligence and Computing, UIC 2006
Y2 - 3 September 2006 through 6 September 2006
ER -