IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computationally Efficient Cooperative Public Key Authentication Protocols in Ubiquitous Sensor Network

Computationally Efficient Cooperative Public Key Authentication Protocols in Ubiquitous Sensor Network
View Sample PDF
Author(s): Abedelaziz Mohaisen (University of Minnesota Twin Cities, USA), Tamer AbuHmed (Inha University,South Korea)and DaeHun Nyang (Inha University, South Korea)
Copyright: 2012
Pages: 19
Source title: Advancements in Distributed Computing and Internet Technologies: Trends and Issues
Source Author(s)/Editor(s): Al-Sakib Khan Pathan (International Islamic University Malaysia (IIUM), Malaysia), Mukaddim Pathan (Commonwealth Scientific and Industrial Research Organization (CSIRO), Australia)and Hae Young Lee (Electronics and Telecommunications Research Institut (ETRI), South Korea)
DOI: 10.4018/978-1-61350-110-8.ch010

Purchase

View Computationally Efficient Cooperative Public Key Authentication Protocols in Ubiquitous Sensor Network on the publisher's website for pricing and purchasing information.

Abstract

The use of public key algorithms to sensor networks brings all merits of these algorithms to such networks: nodes do not need to encounter each other in advance in order to be able to communicate securely. However, this will not be possible unless “good” key management primitives that guarantee the functionality of these algorithms in the wireless sensor networks are provided. Among these primitives is public key authentication: before sensor nodes can use public keys of other nodes in the network to encrypt traffic to them, they need to make sure that the key provided for a particular node is authentic. In the near past, several researchers have addressed the problem and proposed solutions for it as well. In this chapter we review these solutions. We further discuss a new scheme which uses collaboration among sensor nodes for public key authentication. Unlike the existing solutions for public key authentication in sensor network, which demand a fixed, yet high amount of resources, the discussed work is dynamic; it meets a desirable security requirement at a given overhead constraints that need to be provided. It is scalable where the accuracy of the authentication and level of security are merely dependent upon the desirable level of resource consumption that the network operator wants to put into the authentication operation.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom