{"title":"一种新的物联网环境下三方密钥建立方案","authors":"H. Nasiraee, J. B. Mohasefi","doi":"10.1109/ISCISC.2013.6767322","DOIUrl":null,"url":null,"abstract":"Three party key establishment schemes are assumed impractical for traditional Wireless Sensor Networks (WSNs), due to unavailability of trusted third party and limitation of communication radio range in sensor nodes. However, with the advent of Internet-Enabled Sensor Network (IESN), which can provide trusted party by the internet, the future of three party techniques as key establishment scheme for IESN looks bright. In this paper we show vulnerability of existing three party schemes against DoS attacks. Then we propose a hierarchical practical three party scheme, which provides DoS resistance along with low communication cost, reliability, independence of prior deployment knowledge and support of node mobility, i.e. establishing secure channel with a node, which is not met before.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A novel three party key establishment scheme in the context of Internet-of-Things\",\"authors\":\"H. Nasiraee, J. B. Mohasefi\",\"doi\":\"10.1109/ISCISC.2013.6767322\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Three party key establishment schemes are assumed impractical for traditional Wireless Sensor Networks (WSNs), due to unavailability of trusted third party and limitation of communication radio range in sensor nodes. However, with the advent of Internet-Enabled Sensor Network (IESN), which can provide trusted party by the internet, the future of three party techniques as key establishment scheme for IESN looks bright. In this paper we show vulnerability of existing three party schemes against DoS attacks. Then we propose a hierarchical practical three party scheme, which provides DoS resistance along with low communication cost, reliability, independence of prior deployment knowledge and support of node mobility, i.e. establishing secure channel with a node, which is not met before.\",\"PeriodicalId\":265985,\"journal\":{\"name\":\"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCISC.2013.6767322\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC.2013.6767322","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel three party key establishment scheme in the context of Internet-of-Things
Three party key establishment schemes are assumed impractical for traditional Wireless Sensor Networks (WSNs), due to unavailability of trusted third party and limitation of communication radio range in sensor nodes. However, with the advent of Internet-Enabled Sensor Network (IESN), which can provide trusted party by the internet, the future of three party techniques as key establishment scheme for IESN looks bright. In this paper we show vulnerability of existing three party schemes against DoS attacks. Then we propose a hierarchical practical three party scheme, which provides DoS resistance along with low communication cost, reliability, independence of prior deployment knowledge and support of node mobility, i.e. establishing secure channel with a node, which is not met before.