{"title":"一种高效的集群无线传感器网络认证和初始共享密钥建立协议","authors":"J. Abraham, K. Ramanatha","doi":"10.1109/WOCN.2006.1666568","DOIUrl":null,"url":null,"abstract":"This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless sensor networks. The protocol authenticates a source node to a base station, designates a cluster head to each authenticated source node and establishes shared keys between source node and the base station as well as with the cluster head. The above tasks are accomplished in a single step to reduce the required channel capacities. The protocol is implemented for TinyOS using NesC, simulated under TOSSIM and is viable for implementation in resource-constrained platforms like MICA. The security analysis shows that this protocol could withstand several possible attacks in the network","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":"{\"title\":\"An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks\",\"authors\":\"J. Abraham, K. Ramanatha\",\"doi\":\"10.1109/WOCN.2006.1666568\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless sensor networks. The protocol authenticates a source node to a base station, designates a cluster head to each authenticated source node and establishes shared keys between source node and the base station as well as with the cluster head. The above tasks are accomplished in a single step to reduce the required channel capacities. The protocol is implemented for TinyOS using NesC, simulated under TOSSIM and is viable for implementation in resource-constrained platforms like MICA. The security analysis shows that this protocol could withstand several possible attacks in the network\",\"PeriodicalId\":275012,\"journal\":{\"name\":\"2006 IFIP International Conference on Wireless and Optical Communications Networks\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-08-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"27\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IFIP International Conference on Wireless and Optical Communications Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOCN.2006.1666568\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IFIP International Conference on Wireless and Optical Communications Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2006.1666568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks
This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless sensor networks. The protocol authenticates a source node to a base station, designates a cluster head to each authenticated source node and establishes shared keys between source node and the base station as well as with the cluster head. The above tasks are accomplished in a single step to reduce the required channel capacities. The protocol is implemented for TinyOS using NesC, simulated under TOSSIM and is viable for implementation in resource-constrained platforms like MICA. The security analysis shows that this protocol could withstand several possible attacks in the network