2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems 2008
DOI: 10.1109/mahss.2008.4660127
|View full text |Cite
|
Sign up to set email alerts
|

DHB-KEY: An efficient key distribution scheme for wireless sensor networks

Abstract: Abstract-Real-world deployments of wireless sensor networks require secure communication. In many application cases it is sufficient to provide message authentication at the sink. To implement this requirement using symmetric ciphers, keys shared between each sensor node and the sink have to be established and kept fresh during network operation. This paper presents a key distribution scheme based on the well known Elliptic Curve Diffie-Hellman key exchange mechanism that allows us to fulfil the previously out… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Recently, efforts in light weight key distribution schemes have received considerable attention from the research community [59], [60] , [61] and [62]. Elliptic Curve Cryptography based Diffie Hellman (ECDH) is a hot candidate for a lightweight key distribution scheme in IoT.…”
Section: E Key Managementmentioning
confidence: 99%
“…Recently, efforts in light weight key distribution schemes have received considerable attention from the research community [59], [60] , [61] and [62]. Elliptic Curve Cryptography based Diffie Hellman (ECDH) is a hot candidate for a lightweight key distribution scheme in IoT.…”
Section: E Key Managementmentioning
confidence: 99%
“…Unique shared key with the BS is used for generating MAC tag and is generated using the mechanism described below which is based on [18]. The key establishment consists of two phases.…”
Section: B Key Establishmentmentioning
confidence: 99%
“…An eavesdropper knows only Q A and Q B but is unable to compute the secret key from this. However, vulnerability of ECDH has no authentication [9] and no prevention of man-in-the-middle attack [10]. Fig.…”
Section: B Ecdhmentioning
confidence: 99%