Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange

Research output: A Conference proceeding or a Chapter in BookConference contribution

15 Citations (Scopus)
2 Downloads (Pure)

Abstract

Today’s security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, in order to save pre-computing there is a trend for sensor networks to design a sensor-group-leader rather than every sensor node communicates to the end database, which indicated the needs to prevent from the man-in-the middle attacking. In this paper we first present an algorithm that we called “hidden generation point” ECC protocol to protecting the ECC key exchange system from the man-in-middle attacking in wireless sensor networks. Even though there are other ways to be investigated, which will published in other paper, the major contribution in this paper is showing the hidden generation point” works. Also it is noted that the agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. A multi-agent applying for key exchange is motioned even the further discussed will be presented in another paper as the major task of this paper is presenting “hidden generation point.”
Original languageEnglish
Title of host publicationProceedings: 2010 4th International Conference on Network and System Security (NSS)
Place of PublicationWashington, DC, USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages588-593
Number of pages6
Volume1
ISBN (Print)9780769541594
DOIs
Publication statusPublished - 2010
EventFourth International Conference on Network and System Security (NSS 2010), - Melbourne, Australia
Duration: 1 Sep 20103 Sep 2010

Conference

ConferenceFourth International Conference on Network and System Security (NSS 2010),
CountryAustralia
CityMelbourne
Period1/09/103/09/10

Fingerprint

Cryptography
Wireless sensor networks
Sensors
Security systems
Sensor nodes
Sensor networks
Computer systems
Decision making
Availability
Bandwidth
Network protocols
Data storage equipment
Communication

Cite this

Huang, X., & Sharma, D. (2010). Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In Proceedings: 2010 4th International Conference on Network and System Security (NSS) (Vol. 1, pp. 588-593). Washington, DC, USA: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/NSS.2010.15
Huang, Xu ; Sharma, Dharmendra. / Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. Proceedings: 2010 4th International Conference on Network and System Security (NSS). Vol. 1 Washington, DC, USA : IEEE, Institute of Electrical and Electronics Engineers, 2010. pp. 588-593
@inproceedings{db17baaed9f248f094f572d2fc49f857,
title = "Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange",
abstract = "Today’s security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, in order to save pre-computing there is a trend for sensor networks to design a sensor-group-leader rather than every sensor node communicates to the end database, which indicated the needs to prevent from the man-in-the middle attacking. In this paper we first present an algorithm that we called “hidden generation point” ECC protocol to protecting the ECC key exchange system from the man-in-middle attacking in wireless sensor networks. Even though there are other ways to be investigated, which will published in other paper, the major contribution in this paper is showing the hidden generation point” works. Also it is noted that the agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. A multi-agent applying for key exchange is motioned even the further discussed will be presented in another paper as the major task of this paper is presenting “hidden generation point.”",
author = "Xu Huang and Dharmendra Sharma",
year = "2010",
doi = "10.1109/NSS.2010.15",
language = "English",
isbn = "9780769541594",
volume = "1",
pages = "588--593",
booktitle = "Proceedings: 2010 4th International Conference on Network and System Security (NSS)",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Huang, X & Sharma, D 2010, Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. in Proceedings: 2010 4th International Conference on Network and System Security (NSS). vol. 1, IEEE, Institute of Electrical and Electronics Engineers, Washington, DC, USA, pp. 588-593, Fourth International Conference on Network and System Security (NSS 2010), Melbourne, Australia, 1/09/10. https://doi.org/10.1109/NSS.2010.15

Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. / Huang, Xu; Sharma, Dharmendra.

Proceedings: 2010 4th International Conference on Network and System Security (NSS). Vol. 1 Washington, DC, USA : IEEE, Institute of Electrical and Electronics Engineers, 2010. p. 588-593.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange

AU - Huang, Xu

AU - Sharma, Dharmendra

PY - 2010

Y1 - 2010

N2 - Today’s security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, in order to save pre-computing there is a trend for sensor networks to design a sensor-group-leader rather than every sensor node communicates to the end database, which indicated the needs to prevent from the man-in-the middle attacking. In this paper we first present an algorithm that we called “hidden generation point” ECC protocol to protecting the ECC key exchange system from the man-in-middle attacking in wireless sensor networks. Even though there are other ways to be investigated, which will published in other paper, the major contribution in this paper is showing the hidden generation point” works. Also it is noted that the agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. A multi-agent applying for key exchange is motioned even the further discussed will be presented in another paper as the major task of this paper is presenting “hidden generation point.”

AB - Today’s security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, in order to save pre-computing there is a trend for sensor networks to design a sensor-group-leader rather than every sensor node communicates to the end database, which indicated the needs to prevent from the man-in-the middle attacking. In this paper we first present an algorithm that we called “hidden generation point” ECC protocol to protecting the ECC key exchange system from the man-in-middle attacking in wireless sensor networks. Even though there are other ways to be investigated, which will published in other paper, the major contribution in this paper is showing the hidden generation point” works. Also it is noted that the agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. A multi-agent applying for key exchange is motioned even the further discussed will be presented in another paper as the major task of this paper is presenting “hidden generation point.”

U2 - 10.1109/NSS.2010.15

DO - 10.1109/NSS.2010.15

M3 - Conference contribution

SN - 9780769541594

VL - 1

SP - 588

EP - 593

BT - Proceedings: 2010 4th International Conference on Network and System Security (NSS)

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - Washington, DC, USA

ER -

Huang X, Sharma D. Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In Proceedings: 2010 4th International Conference on Network and System Security (NSS). Vol. 1. Washington, DC, USA: IEEE, Institute of Electrical and Electronics Engineers. 2010. p. 588-593 https://doi.org/10.1109/NSS.2010.15