DocumentCode
1982147
Title
Sensor networks with secure public-key over GF (2m)
Author
Huang, Xu
Author_Institution
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
Volume
1
fYear
2010
fDate
7-10 Feb. 2010
Firstpage
35
Lastpage
40
Abstract
In Observing and interacting with the real physical world sensor networks now take new opportunities for play the roles in almost everywhere. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major concern in sensor networks. For the given extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary attack becomes a serious security threat toward wireless sensor networks. In this paper a secure public-key based effective and efficient sensor network is to be introduced. A saving time, reducing computing energy, algorithm is carefully investigated. The powerful elliptic curve cryptography (ECC) over GF (2m) is also investigated with hidden generator point.
Keywords
public key cryptography; telecommunication security; wireless sensor networks; adversary attack; elliptic curve cryptography; energy consumption; secure public-key; security threat; sensor node; wireless sensor network; Australia; Batteries; Data security; Databases; Elliptic curve cryptography; Energy consumption; Hardware; Protection; Public key; Wireless sensor networks; 1´s complement of binary numbers; complementary recoding; denial-of-service attack; elliptic curve crytographic; fast calculations in ECC; hidden generator point; man-in-middle attack; public key;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
Conference_Location
Phoenix Park
ISSN
1738-9445
Print_ISBN
978-1-4244-5427-3
Type
conf
Filename
5440512
Link To Document