By Topic

Sensor networks with secure public-key over GF (2m)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Xu Huang ; Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia

In Observing and interacting with the real physical world sensor networks now take new opportunities for play the roles in almost everywhere. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major concern in sensor networks. For the given extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary attack becomes a serious security threat toward wireless sensor networks. In this paper a secure public-key based effective and efficient sensor network is to be introduced. A saving time, reducing computing energy, algorithm is carefully investigated. The powerful elliptic curve cryptography (ECC) over GF (2m) is also investigated with hidden generator point.

Published in:

Advanced Communication Technology (ICACT), 2010 The 12th International Conference on  (Volume:1 )

Date of Conference:

7-10 Feb. 2010