A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks

被引:0
作者
Louw, J. [1 ]
Niezen, G. [1 ]
Ramotsoela, T. D. [1 ]
Abu-Mahfouz, A. M. [2 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa
[2] CSIR, Meraka Inst, POB 395, ZA-0001 Pretoria, South Africa
来源
2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN) | 2016年
关键词
wireless sensor networks; key distribution; authentication; network security; elliptic curve cryptography; SECURITY; IMPLEMENTATIONS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have become increasingly popular in many applications across a broad range of fields. Securing WSNs poses unique challenges mainly due to their resource constraints. Traditional public key cryptography (PKC) for instance is considered to be too computationally expensive for direct implementation in WSNs. Elliptic curve cryptography (ECC) allows one to reach the same level of security as traditional PKC using smaller key sizes. In this paper, a key distribution protocol was designed to securely provide authenticated motes with secret system keys using ECC based cryptographic functions. The designed scheme met the minimum requirements for a key distribution scheme to be considered secure and efficient in WSNs.
引用
收藏
页码:1166 / 1170
页数:5
相关论文
共 34 条
  • [1] Distance Bounding: A Practical Security Solution for Real-Time Location Systems
    Abu-Mahfouz, Adnan
    Hancke, Gerhard P.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 16 - 27
  • [2] [Anonymous], 2015, P 2015 INF SEC S AFR, DOI DOI 10.1109/ISSA.2015.7335058
  • [3] [Anonymous], IEEE SENSORS J
  • [4] Banu AJ, 2013, INT C TREND COMPUT C, P706, DOI 10.1109/ICE-CCN.2013.6528596
  • [5] An Overview on Wireless Sensor Networks Technology and Evolution
    Buratti, Chiara
    Conti, Andrea
    Dardari, Davide
    Verdone, Roberto
    [J]. SENSORS, 2009, 9 (09) : 6869 - 6896
  • [6] Burgner Daniel E., 2011, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), P315, DOI 10.1109/ITNG.2011.62
  • [7] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [8] Chen W., 2010, 2 INT WORKSH NEAR FI, P83
  • [9] Chinnapen-Rimer S., INDERSCIENCE INT J S, V10, P177
  • [10] DU W, 2005, P 6 ACM INT S MOB AD, P58