An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

by   Sina Baghbanijam, et al.

Wide-spread use of wireless sensor networks (WSNs) that are consisted of resource-constrained sensor nodes in communication with gateways in sensitive and mission-critical industries have highlighted the need for a secure yet fast communication protocol between users, gateways and sensor nodes. Due to the properties of the network, elliptic-curve cryptography seems to be the most viable choice as it requires less resources than most other options. In this paper we analyze the protocol suggested by Moghadam et al. which is based on ECDH (elliptic-curve Diffie-Hellman) and mention some of the flaws in their proposed authentication and key exchange protocol. Some attacks are also mentioned to further explain the shortcomings of their schema. Then a modified version of the protocol is proposed, analyzed and checked against the same attacks as an informal security proof.


page 1

page 2

page 3

page 4


Key management system for WSNs based on hash functions and elliptic curve cryptography

Due to hostile environment and wireless communication channel, security ...

A User-Based Authentication and DoS Mitigation Scheme for Wearable Wireless Body Sensor Networks

Wireless Body Sensor Networks (WBSNs) is one of the greatest growing tec...

LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure

Smart metering infrastructure (SMI) is the core component of the smart g...

Trusted Authentication using hybrid security algorithm in VANET

Vehicular Ad Hoc Networks (VANETs) improves traffic management and reduc...

A Key-Agreement Protocol Based on Static Parameters and Hash Functions

Wireless Body Sensor Network (WBSN) is a developing technology with cons...

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

Coding Opportunistically (COPE) is a simple but very effective data codi...

Please sign up or login with your details

Forgot password? Click here to reset