Skip to Main Content
It was subjected of the concern of the researchers in which the security issue of the sensor network is many while the wireless sensor network rose as the ubiquitous computing core technology. Accordingly, many security protocols were proposed. And generally these are classified as the protocol of the symmetric key base and protocol of the public key infrastructure. Because of demanding the computation load in which the public key cryptography is excessive, security protocols using the symmetrical key code like SPIN are not appropriate in the sensor network. And an expandability is decreased as the size of a network is enlarged. Therefore, presently, many research that it relates to apply the security protocol putting a foundation in the public key to the sensor network is progressing. Presently, it was proposed in the protocols of the public key infrastructure like TinyPK and ECC2.0. The key exchange authenticated with three-party authenticated key exchange protocol, two-party authenticated key exchange protocol the verifier moreover induced from a password is proposed. But it is generated in the notable performance degradation and the problems that is weak in the man-in-the-middle attack. Moreover, the EKE(encrypted key exchange) technique of the password base is attacked with the password guessing attack, the secret key guess attack of a server, and the message retransmission the password file of a server is attacked. In this paper, the safe communications service was provided to users registered in the identical server. The authenticated key exchange of the password base which uses the smart card in order not to store a password in a server was proposed. And the clustering concept was applied to ECDH(elliptic curve Differ-Hellman) key agreement protocol for the shared key setting up between the efficient and safe node. And ECDSA(elliptic curve digital signature algorithm) is used in order to use the short stature in comparison with existing digital signature alg- orithms more and provide the efficient broadcast authentication.