Abstract
The rapid progress of wireless communications and embedded micro‐electro‐system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application’s requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today’s software applications are mainly characterized by their component‐based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man‐in‐the middle attack and (c) we first investigates multi‐agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre‐computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man‐in‐the middle attack. A designed a hidden generator point that offer a good protection from the man‐in‐the middle (MinM) attack which becomes one of major worries for the sensor’s networks with multiagent system is also discussed.
Original language | English |
---|---|
Title of host publication | IAENG transactions on engineering technologies; volume 5: special edition of the international multiconference of engineers and computer scientists 2010 |
Editors | Sio-Iong Ao, Hideki Katagir, Li Xu, Alan Hoi-Shou Chan |
Place of Publication | New York, USA |
Publisher | American Institute of Physics |
Pages | 519-531 |
Number of pages | 13 |
Edition | 1 |
ISBN (Print) | 9780735408395 |
DOIs | |
Publication status | Published - 2010 |