29
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

      , , ,
      Journal of Sensors
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          WSN (wireless sensor network) is one of the main technologies in IoT (Internet of Things) applications or services. To date, several schemes have been proposed to establish a pair-wise key between two nodes in WSN, and most of them are designed to establish long-term keys used throughout the network lifetime. However, in the near future, if WSN will be used for information infrastructures in various fields such as manufacturing, distribution, or public facilities management and its life cycle can be as long as that of other common networks, it will definitely be advantageous in terms of security to encrypt messages using session keys instead of long-term keys. In this paper, we propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (ECDH) key exchange and hash chain. The proposed scheme eliminates vulnerabilities of existing schemes for WSN and has improved security. The proposed scheme is efficient in terms of energy costs compared to related schemes.

          Related collections

          Most cited references34

          • Record: found
          • Abstract: not found
          • Article: not found

          A survey on sensor networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Wireless sensor network survey

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Use of Elliptic Curves in Cryptography

                Bookmark

                Author and article information

                Journal
                Journal of Sensors
                Journal of Sensors
                Hindawi Limited
                1687-725X
                1687-7268
                2016
                2016
                : 2016
                :
                : 1-17
                Article
                10.1155/2016/4393721
                5765e110-65e4-4c45-b8ca-57b908d80cc2
                © 2016

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article