E.D. Manley, J.S. Deogun, and H. Al Nahas (USA)
sensor network, wireless, security, public-key
Interest in using public-key cryptography for securing sen sor networks is increasing. While the computational de mands of many public-key algorithms has ruled out their use in sensor networks, recent studies have shown that some public-key algorithms can be efficiently implemented on certain sensor nodes. However the use of public-key cryptography in distributed sensor networks presents au thentication problems. Without addressing these issues, the network is open to attack by imposter nodes. We present a hybrid scheme that uses shared secrets, preloaded on nodes with a random key pre-distribution scheme, to allow for node-to-node authentication so that trust may be verified before setting up cryptographic keys with public-key meth ods.
Important Links:
Go Back