• DocumentCode
    1616319
  • Title

    A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography

  • Author

    Eldefrawy, Mohamed Hamdy ; Khan, Muhammad Khurram ; Alghathbar, Khaled

  • Author_Institution
    Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ., Riyadh, Saudi Arabia
  • fYear
    2010
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many key agreement schemes come with a shortage of considering sensor addition, revocation, and also rekeying. This paper proposes a key distribution protocol based on the public key cryptography, RSA, and DHECC. The proposed protocol does not trust individual sensors, and partially trust the Gateway. Our protocol establishes pair-wise keys between nodes according to a specific routing algorithm after deployment, instead of loading full pair-wise keys into each node. So each node doesn´t have to share a key with all neighbors except those involved in the routing path with it, which is the key role of increasing the resiliency, against node capturing, and also the storage efficiency. The proposed scheme comes to circumvent the shortage of providing the rekeying property of nodes and also nodes addition and revocation, comes with previous algorithms. We evaluate our algorithm from the WSN security view point.
  • Keywords
    cryptographic protocols; public key cryptography; telecommunication network routing; telecommunication security; wireless sensor networks; DHECC cryptography; RSA cryptography; key agreement algorithm; key distribution protocol; pair-wise keys; public key cryptography; rekeying property; routing algorithm; sensor addition; sensor rekeying; sensor revocation; wireless sensor networks; Logic gates; Protocols; Public key; Routing; Wireless sensor networks; DHECC; Key agreement; RSA; Rekeying; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Anti-Counterfeiting Security and Identification in Communication (ASID), 2010 International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4244-6731-0
  • Type

    conf

  • DOI
    10.1109/ICASID.2010.5551480
  • Filename
    5551480