An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

by   Sina Baghbanijam, et al.

Wide-spread use of wireless sensor networks (WSNs) that are consisted of resource-constrained sensor nodes in communication with gateways in sensitive and mission-critical industries have highlighted the need for a secure yet fast communication protocol between users, gateways and sensor nodes. Due to the properties of the network, elliptic-curve cryptography seems to be the most viable choice as it requires less resources than most other options. In this paper we analyze the protocol suggested by Moghadam et al. which is based on ECDH (elliptic-curve Diffie-Hellman) and mention some of the flaws in their proposed authentication and key exchange protocol. Some attacks are also mentioned to further explain the shortcomings of their schema. Then a modified version of the protocol is proposed, analyzed and checked against the same attacks as an informal security proof.


page 1

page 2

page 3

page 4


Key management system for WSNs based on hash functions and elliptic curve cryptography

Due to hostile environment and wireless communication channel, security ...

LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure

Smart metering infrastructure (SMI) is the core component of the smart g...

Encryption Algorithm for TCP Session Hijacking

Distributed network of the computer and the design defects of the TCP pr...

Research on a Hybrid System With Perfect Forward Secrecy

The rapid development of computer technology will be the whole world as ...

Trusted Authentication using hybrid security algorithm in VANET

Vehicular Ad Hoc Networks (VANETs) improves traffic management and reduc...

A Key-Agreement Protocol Based on Static Parameters and Hash Functions

Wireless Body Sensor Network (WBSN) is a developing technology with cons...

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

Coding Opportunistically (COPE) is a simple but very effective data codi...