Key management system for WSNs based on hash functions and elliptic curve cryptography

11/23/2017
by   Hamzeh Ghasemzadeh, et al.
0

Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show that it is vulnerable to denial of service (DOS) attacks and adversary can exhaust memory and battery of nodes. Then, we analyze this protocol and show that using a more knowledgeable BS this vulnerability can be solved very efficiently. Based on this observation we propose a modified version of the protocol that achieves immediate authentication and can prevent DOS attacks. We show that the improved protocol achieves immediate authentication at the expense of 1.82 mj extra energy consumption while retaining other desirable characteristics of the basic method.

READ FULL TEXT

page 1

page 2

page 3

page 4

09/23/2021

An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

Wide-spread use of wireless sensor networks (WSNs) that are consisted of...
11/09/2012

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

In this paper secured wireless communication using fuzzy logic based hig...
05/20/2022

Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems

Recent advancements in wireless charging technology, as well as the poss...
05/13/2021

Trusted Authentication using hybrid security algorithm in VANET

Vehicular Ad Hoc Networks (VANETs) improves traffic management and reduc...
10/17/2020

A Key-Agreement Protocol Based on Static Parameters and Hash Functions

Wireless Body Sensor Network (WBSN) is a developing technology with cons...
01/16/2020

Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

Wireless sensor networks (WSNs) have been vastly employed in the collect...
11/19/2020

TrustSense: An energy efficient trust scheme for clustered wireless sensor networks

Designing security systems for wireless sensor networks presents a chall...