TY - GEN
T1 - Self-certified group key generation for ad hoc clusters in wireless sensor networks
AU - Arazi, Ortal
AU - Qi, Hairong
PY - 2005/12/1
Y1 - 2005/12/1
N2 - Dynamic formation of node clusters is inherently embedded in a wide range of emerging wireless sensor network (WSN) applications. It is expected that security will play a key role in the design and successful deployment of these, as well as many other, applications. The ad-hoc nature and unique power-constraint characteristics of WSN suggest that a prerequisite for achieving security is the ability to encrypt and decrypt confidential data among an arbitrary set of sensor nodes. Consequently, the nodes are required to generate a joint secret key. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This paper describes a pragmatic ECC-based methodology for self-certified group key generation in ad hoc clusters of sensor nodes. A novel load-balancing technique and chained data exchange yield reduced overall communications and facilitate an efficient distribution of the computational effort involved.
AB - Dynamic formation of node clusters is inherently embedded in a wide range of emerging wireless sensor network (WSN) applications. It is expected that security will play a key role in the design and successful deployment of these, as well as many other, applications. The ad-hoc nature and unique power-constraint characteristics of WSN suggest that a prerequisite for achieving security is the ability to encrypt and decrypt confidential data among an arbitrary set of sensor nodes. Consequently, the nodes are required to generate a joint secret key. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This paper describes a pragmatic ECC-based methodology for self-certified group key generation in ad hoc clusters of sensor nodes. A novel load-balancing technique and chained data exchange yield reduced overall communications and facilitate an efficient distribution of the computational effort involved.
KW - Group Public Key Generation
KW - Resource-Constraint Cryptography
KW - Security in Wireless Sensor Networks
UR - https://www.scopus.com/pages/publications/33748347087
U2 - 10.1109/ICCCN.2005.1523886
DO - 10.1109/ICCCN.2005.1523886
M3 - Conference contribution
AN - SCOPUS:33748347087
SN - 0780394283
SN - 9780780394285
T3 - Proceedings - International Conference on Computer Communications and Networks, ICCCN
SP - 359
EP - 364
BT - Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005
T2 - 14th International Conference on Computer Communications and Networks, ICCCN 2005
Y2 - 17 October 2005 through 19 October 2005
ER -