DocumentCode :
2192241
Title :
An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network
Author :
Wang, Eric Ke ; Ye, Yunming
Author_Institution :
Dept. of Comput. Sci., Harbin Inst. of Technol., Harbin, China
fYear :
2010
fDate :
2-4 April 2010
Firstpage :
511
Lastpage :
516
Abstract :
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth and defection of centra authority. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual-authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous path-key establishment. At the meantime, it can achieve efficient group key agreement and management by tree-based extension of LU Matrix Composition key exchange protocol(TGLU). Theoretical analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
Keywords :
authorisation; cryptographic protocols; public key cryptography; telecommunication security; wireless sensor networks; LU matrix composition key exchange protocol; anonymous path-key establishment; elliptic curve Diffie-Hellman; group key agreement; integrating LU matrix; key distribution center; key management; mutual authentication; pairwise key establishment; public key cryptography; secure key establishment scheme; tree-based extension; wireless sensor network; Bandwidth; Computer network management; Computer networks; Distributed computing; Elliptic curves; Energy management; Performance analysis; Power supplies; Public key cryptography; Wireless sensor networks; Key establishment; Key management; LU matrix composition; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on
Conference_Location :
Jinggangshan
Print_ISBN :
978-1-4244-6730-3
Electronic_ISBN :
978-1-4244-6743-3
Type :
conf
DOI :
10.1109/IITSI.2010.139
Filename :
5453604
Link To Document :
بازگشت