A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks
by Gaurav Indra; Renu Taneja
International Journal of Space-Based and Situated Computing (IJSSC), Vol. 4, No. 1, 2014

Abstract: Public key cryptography has been playing an important and vital role in providing security in various domains including secure electronic transactions in distributed environment and secure communication between different nodes in a wireless ad-hoc network. The security in wireless sensor networks is currently provided mostly through symmetric key cryptography. The proposed protocols in this domain are mainly based on the idea of keys before the deployment of the wireless sensor network. However, due to the limitation on memory resources of wireless sensor nodes, these protocols are not able to achieve perfect security and also face a key management problem in large scale wireless sensor networks. On the other hand asymmetric key cryptography offers flexibility to node and clean interface for the security component in the sensor network. This paper proposes a new mutual authentication and key management scheme for a particular session between any two corresponding nodes of a wireless sensor network based on elliptic curve cryptography with a novel time stamp mechanism. Nevertheless the same mutual authentication and key management scheme for a particular session in wireless sensor networks can be extended efficiently for a multi-session scenario in domain of wireless sensor networks or in the wired or wireless ad-hoc networks.

Online publication date: Sat, 05-Jul-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Space-Based and Situated Computing (IJSSC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com