Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography

被引:0
作者
Li, Dongmei [1 ]
Liu, Yan [2 ]
机构
[1] Nanyang Inst Technol, Nanyang 473004, Henan, Peoples R China
[2] Zhongzhou Univ, Informat Engn Inst, Zhengzhou 450044, Henan, Peoples R China
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY | 2015年 / 17卷
关键词
Elliptic Curve; Wireless sensor network; Cryptography; Security; Public key cryptosystem;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Wireless sensor network may encounter eavesdropping, message modification, message injection, route spoofing, denial of service, malicious code threats. This paper discusses the application of Elliptic Curve Cryptography in security in wireless sensor networks, discusses a wireless authentication and key agreement protocol based on elliptic curve cryptosystem. The paper proposes development of security scheme on wireless sensor network based on Elliptic Curve Cryptography. Safety examples prove that the proposed algorithm of wireless sensor network is effective.
引用
收藏
页码:630 / 634
页数:5
相关论文
共 10 条
[1]  
ADACHI D, 2005, COMMUN COMPUT PHYS, P117
[2]   Field inversion and point halving revisited [J].
Fong, K ;
Hankerson, D ;
López, J ;
Menezes, A .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (08) :1047-1059
[3]  
Gebotys C., 2004, ACM T EMBED COMPUT S, V3, P92
[4]  
Lasheng Yu, 2013, Journal of Convergence Information Technology, V8, P98, DOI 10.4156/jcit.vol8.issue4.12
[5]  
Lauter K., 2004, IEEE T COMPUT, V11, P64
[6]  
Lopez Julio, 2000, TECHNICAL REPORT, V11, P183
[7]   High performance FPGA based elliptic curve cryptographic co-processor [J].
Lutz, J ;
Hasan, A .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :486-492
[8]   Fast computation of canonical lifts of elliptic curves and its application to point counting [J].
Satoh, T ;
Skjernaa, B ;
Taguchi, Y .
FINITE FIELDS AND THEIR APPLICATIONS, 2003, 9 (01) :89-101
[9]  
Wang Bin, 2013, AISS, V5, P782
[10]  
Zhang Li, 2013, Journal of Convergence Information Technology, V8, P1163, DOI 10.4156/jcit.vol8.issue5.135