Title :
Sensor networks with secure public-key over GF (2m)
Author_Institution :
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
Abstract :
In Observing and interacting with the real physical world sensor networks now take new opportunities for play the roles in almost everywhere. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major concern in sensor networks. For the given extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary attack becomes a serious security threat toward wireless sensor networks. In this paper a secure public-key based effective and efficient sensor network is to be introduced. A saving time, reducing computing energy, algorithm is carefully investigated. The powerful elliptic curve cryptography (ECC) over GF (2m) is also investigated with hidden generator point.
Keywords :
public key cryptography; telecommunication security; wireless sensor networks; adversary attack; elliptic curve cryptography; energy consumption; secure public-key; security threat; sensor node; wireless sensor network; Australia; Batteries; Data security; Databases; Elliptic curve cryptography; Energy consumption; Hardware; Protection; Public key; Wireless sensor networks; 1´s complement of binary numbers; complementary recoding; denial-of-service attack; elliptic curve crytographic; fast calculations in ECC; hidden generator point; man-in-middle attack; public key;
Conference_Titel :
Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
Conference_Location :
Phoenix Park
Print_ISBN :
978-1-4244-5427-3