By Topic

A Three - Party Authenticated Key Exchange Scheme Smartcard using Elliptic Curve Cryptosystem for Secure Key Exchange in Wireless Sensor Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jongwon Yang ; Kongju Nat. Univ., Kongju ; Changho Seo ; Jinman Cho

It was subjected of the concern of the researchers in which the security issue of the sensor network is many while the wireless sensor network rose as the ubiquitous computing core technology. Accordingly, many security protocols were proposed. And generally these are classified as the protocol of the symmetric key base and protocol of the public key infrastructure. Because of demanding the computation load in which the public key cryptography is excessive, security protocols using the symmetrical key code like SPIN are not appropriate in the sensor network. And an expandability is decreased as the size of a network is enlarged. Therefore, presently, many research that it relates to apply the security protocol putting a foundation in the public key to the sensor network is progressing. Presently, it was proposed in the protocols of the public key infrastructure like TinyPK and ECC2.0. The key exchange authenticated with three-party authenticated key exchange protocol, two-party authenticated key exchange protocol the verifier moreover induced from a password is proposed. But it is generated in the notable performance degradation and the problems that is weak in the man-in-the-middle attack. Moreover, the EKE(encrypted key exchange) technique of the password base is attacked with the password guessing attack, the secret key guess attack of a server, and the message retransmission the password file of a server is attacked. In this paper, the safe communications service was provided to users registered in the identical server. The authenticated key exchange of the password base which uses the smart card in order not to store a password in a server was proposed. And the clustering concept was applied to ECDH(elliptic curve Differ-Hellman) key agreement protocol for the shared key setting up between the efficient and safe node. And ECDSA(elliptic curve digital signature algorithm) is used in order to use the short stature in comparison with existing digital signature alg- orithms more and provide the efficient broadcast authentication.

Published in:

Consumer Electronics, 2007. ISCE 2007. IEEE International Symposium on

Date of Conference:

20-23 June 2007