{"title":"An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks","authors":"J. Abraham, K. Ramanatha","doi":"10.1109/WOCN.2006.1666568","DOIUrl":null,"url":null,"abstract":"This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless sensor networks. The protocol authenticates a source node to a base station, designates a cluster head to each authenticated source node and establishes shared keys between source node and the base station as well as with the cluster head. The above tasks are accomplished in a single step to reduce the required channel capacities. The protocol is implemented for TinyOS using NesC, simulated under TOSSIM and is viable for implementation in resource-constrained platforms like MICA. The security analysis shows that this protocol could withstand several possible attacks in the network","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IFIP International Conference on Wireless and Optical Communications Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2006.1666568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless sensor networks. The protocol authenticates a source node to a base station, designates a cluster head to each authenticated source node and establishes shared keys between source node and the base station as well as with the cluster head. The above tasks are accomplished in a single step to reduce the required channel capacities. The protocol is implemented for TinyOS using NesC, simulated under TOSSIM and is viable for implementation in resource-constrained platforms like MICA. The security analysis shows that this protocol could withstand several possible attacks in the network