{"title":"Private Communication and Authentication Protocol for Wireless Sensor Networks","authors":"S. Rahman, N. Nasser, A. Inomata","doi":"10.1109/NTMS.2008.ECP.80","DOIUrl":null,"url":null,"abstract":"Key management is a key concern for security operation in sensor network. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and causes large overhead. In this paper, we propose a novel key agreement protocol based on pairing-based cryptography. The proposed protocol reduces the key spaces of the nodes, in fact nodes do not need to store any key of the other nodes rather it computes secret sharing key by using pairing and identity based properties. Security analysis shows it robust against different attacks such as masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 New Technologies, Mobility and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2008.ECP.80","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Key management is a key concern for security operation in sensor network. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and causes large overhead. In this paper, we propose a novel key agreement protocol based on pairing-based cryptography. The proposed protocol reduces the key spaces of the nodes, in fact nodes do not need to store any key of the other nodes rather it computes secret sharing key by using pairing and identity based properties. Security analysis shows it robust against different attacks such as masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.