Abstract
In 2003, Huang et al. proposed an authenticated key exchange (AKE) protocol for secure communications between a sensor and a security manager based on elliptic curve cryptography in a self-organizing sensor network. In 2005, Tian et al., however, showed that a security manager will learn the long-term private key of a sensor after having one normal run of the protocol with the sensor. Then they proposed an improvement which solves the problem. The current paper, however, demonstrates neither protocol provides perfect forward secrecy, and presents an improved protocol in order to address this problem. Not only is the computational cost of the proposed AKE protocol less than that of both protocols, the number of steps in communication is one fewer than conventional protocols and only needs three steps.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of 9th CCS ACM conference, pp. 41–47 (2002)
IEEE Std. 802.15.4-2003.: IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANS) (2003)
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In: Proc. of the Second ACM International Conference on Wireless Sensor Networks and Applications, pp. 141–150. ACM Press, New York (2003)
Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)
Tian, X., Wong, D.S., Zhu, R.W.: Analysis and Improvement of an Authenticated Key Exchange Protocol for Sensor Networks. IEEE Communication Letters 9(11), 970–972 (2005)
Struik, R., Rasor, G.: Mandatory ECC Security Algorithm Suite. Submissions to IEEE P802.15 Wireless Personal Area Networks (March 2002)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transaction on Information Theory IT-22(6), 644–654 (1976)
Schneier, B.: Applied Cryptography-Protocols. In: Algorithms and Source Code in C, 2nd edn. John Wiley & Sons Inc., Chichester (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2006). An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. In: Youn, H.Y., Kim, M., Morikawa, H. (eds) Ubiquitous Computing Systems. UCS 2006. Lecture Notes in Computer Science, vol 4239. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11890348_41
Download citation
DOI: https://doi.org/10.1007/11890348_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46287-3
Online ISBN: 978-3-540-46289-7
eBook Packages: Computer ScienceComputer Science (R0)