Abstract

It was subjected of the concern of the researchers in which the security issue of the sensor network is many while the wireless sensor network rose as the ubiquitous computing core technology. Accordingly, many security protocols were proposed. And generally these are classified as the protocol of the symmetric key base and protocol of the public key infrastructure. Because of demanding the computation load in which the public key cryptography is excessive, security protocols using the symmetrical key code like SPIN are not appropriate in the sensor network. And an expandability is decreased as the size of a network is enlarged. Therefore, presently, many research that it relates to apply the security protocol putting a foundation in the public key to the sensor network is progressing. Presently, it was proposed in the protocols of the public key infrastructure like TinyPK and ECC2.0. The key exchange authenticated with three-party authenticated key exchange protocol, two-party authenticated key exchange protocol the verifier moreover induced from a password is proposed. But it is generated in the notable performance degradation and the problems that is weak in the man-in-the-middle attack. Moreover, the EKE(encrypted key exchange) technique of the password base is attacked with the password guessing attack, the secret key guess attack of a server, and the message retransmission the password file of a server is attacked. In this paper, the safe communications service was provided to users registered in the identical server. The authenticated key exchange of the password base which uses the smart card in order not to store a password in a server was proposed. And the clustering concept was applied to ECDH(elliptic curve Differ-Hellman) key agreement protocol for the shared key setting up between the efficient and safe node. And ECDSA(elliptic curve digital signature algorithm) is used in order to use the short stature in comparison with existing digital signature algorithms more and provide the efficient broadcast authentication.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.