A key management scheme for wireless sensor networks based on bridge and ECC

J. Zheng, F. F. Zhao, D. X. Wang, S. C. Xu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Providing a key suitable management protocol is a challenging task in wireless sensor network. Based on Elliptic Curve Cryptography and Bridge, a key management scheme for wireless sensor network is proposed in the paper. It adopts the bridge and hash chain technologies to achieve session keys establishment and fast authentication between nodes. This protocol also supports new nodes join and invalid nodes elimination, so it has good dynamics and extendibility. It is proved that the protocol is secure under the Elliptical Curve Discrete Logarithm Problem. The analysis result indicates that the scheme has advantages of good security, a small amount of calculation and less storage consumption.

Original languageEnglish
Title of host publicationEnvironmental Engineering and Computer Application - Proceedings of the International Conference on Environmental Engineering and Computer Application, ICEECA 2014
EditorsKennis Chan
PublisherCRC Press/Balkema
Pages439-446
Number of pages8
ISBN (Print)9781138028074
DOIs
Publication statusPublished - 2015
EventInternational Conference on Environmental Engineering and Computer Application, ICEECA 2014 - Kowloon, Hong Kong
Duration: 25 Dec 201426 Dec 2014

Publication series

NameEnvironmental Engineering and Computer Application - Proceedings of the International Conference on Environmental Engineering and Computer Application, ICEECA 2014

Conference

ConferenceInternational Conference on Environmental Engineering and Computer Application, ICEECA 2014
Country/TerritoryHong Kong
CityKowloon
Period25/12/1426/12/14

Keywords

  • Bridge
  • One-way hash chain
  • Session key establishment
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'A key management scheme for wireless sensor networks based on bridge and ECC'. Together they form a unique fingerprint.

Cite this