Title :
An elliptic threshold signature framework for k-security in wireless sensor networks
Author :
Sliti, Maha ; Hamdi, Mohamed ; Boudriga, Noureddine
Author_Institution :
Commun. Networks & Security Res. Lab., Univ. of Carthage, Carthage
fDate :
Aug. 31 2008-Sept. 3 2008
Abstract :
This paper develops an authentication framework for heterogeneous wireless sensor networks. We introduce a novel concept, called k-security, in order to thwart the impact of false alerts emanating from malicious sensor nodes. The proposed technique relies on elliptic curve cryptography and threshold signature. The major novelty of our approach is that an intermediate verification of the alert messages allows discarding spoofed messages while being forwarded. This saves important energy and processing resources and consequently extends the network lifetime.
Keywords :
cryptography; message authentication; wireless sensor networks; alert messages; authentication framework; elliptic curve cryptography; elliptic threshold signature framework; false alerts; heterogeneous wireless sensor networks; k-security; malicious sensor nodes; Authentication; Communication networks; Elliptic curve cryptography; Intelligent networks; Monitoring; Public key; Public key cryptography; Sensor phenomena and characterization; Target tracking; Wireless sensor networks; Wireless sensor networks; elliptic curve cryptography; threshold signature;
Conference_Titel :
Electronics, Circuits and Systems, 2008. ICECS 2008. 15th IEEE International Conference on
Conference_Location :
St. Julien´s
Print_ISBN :
978-1-4244-2181-7
Electronic_ISBN :
978-1-4244-2182-4
DOI :
10.1109/ICECS.2008.4674832