A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks

被引:3
作者
Li, Yue [1 ]
Chen, Dehua [1 ]
Li, Wei [1 ]
Wang, Gaoli [1 ]
Smith, Paul [2 ]
机构
[1] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
[2] ADI Univ East London, Comp Games Acad Team EB 3 13A, London E16 2RD, England
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2013年
基金
中国国家自然科学基金;
关键词
SCHEME; LOGIC;
D O I
10.1155/2013/716265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are a modern and advanced technology whose applications are fast developing in recent years. Despite being a fascinating topic with various visions of a more intelligent world, there still exist security issues to be resolved in order to make WSNs fully adoptable. Due to the resource constraints of sensor nodes, it is infeasible to use traditional key establishment techniques that find use in fixed communication systems. In this paper, the design of a new hybrid Authenticated Group Key Agreement (AGKA) protocol is described for WSNs. The AGKA protocol reduces the high cost public-key operations at the sensor side and replaces them with efficient symmetric-key based operations. The proposed AGKA protocol is not only efficient but also meets strong security requirements. In order to demonstrate the protocol is verifiably secure and trustworthy, a formal verification of the AGKA protocol is carried out. Furthermore, several experiments are conducted on MICAz and TelosB platforms in order to evaluate the performance of the proposed protocol. The evaluation results show that the AGKA protocol is well suited for use with resource-constrained sensor nodes.
引用
收藏
页数:14
相关论文
共 39 条
  • [1] Ammayappan Kavitha, 2011, Journal of Computers, V6, P2408, DOI 10.4304/jcp.6.11.2408-2416
  • [2] [Anonymous], P 1 INT WORKSH PEER
  • [3] [Anonymous], IEEE STAND INF TECHN
  • [4] [Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
  • [5] Aydos M., 2000, P 16 ANN COMP SEC AP
  • [6] Berkeley U., 2007, TINYOS COMMUNITY FOR
  • [7] Mutual authentication and group key agreement for low-power mobile devices
    Bresson, E
    Chevassut, O
    Essiari, A
    Pointcheval, D
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1730 - 1737
  • [8] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [9] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [10] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32