کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4962144 1446526 2016 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Implementation of Node Authentication for WSN Using Hash Chains
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر علوم کامپیوتر (عمومی)
پیش نمایش صفحه اول مقاله
Implementation of Node Authentication for WSN Using Hash Chains
چکیده انگلیسی

This paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without using any digital signature algorithm or any public key cryptography. The usage of hidden generator point derived from hash-chains provides defense against a man-in-the-middle attack which is prominent in ECDH (Elliptical Curve Diffie-Hellman) due to lack of entity authentication. The authentication protocol has been simulated on Tossim and its performance bench marking has also been carried out.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Procedia Computer Science - Volume 89, 2016, Pages 90-98
نویسندگان
, , ,