Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

19 Citations (Scopus)
58 Downloads (Pure)

Abstract

Today’s security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, in order to save pre-computing there is a trend for sensor networks to design a sensor-group-leader rather than every sensor node communicates to the end database, which indicated the needs to prevent from the man-in-the middle attacking. In this paper we first present an algorithm that we called “hidden generation point” ECC protocol to protecting the ECC key exchange system from the man-in-middle attacking in wireless sensor networks. Even though there are other ways to be investigated, which will published in other paper, the major contribution in this paper is showing the hidden generation point” works. Also it is noted that the agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. A multi-agent applying for key exchange is motioned even the further discussed will be presented in another paper as the major task of this paper is presenting “hidden generation point.”
Original languageEnglish
Title of host publicationProceedings: 2010 4th International Conference on Network and System Security (NSS)
Place of PublicationWashington, DC, USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages588-593
Number of pages6
Volume1
ISBN (Print)9780769541594
DOIs
Publication statusPublished - 2010
EventFourth International Conference on Network and System Security (NSS 2010), - Melbourne, Australia
Duration: 1 Sept 20103 Sept 2010

Conference

ConferenceFourth International Conference on Network and System Security (NSS 2010),
Country/TerritoryAustralia
CityMelbourne
Period1/09/103/09/10

Fingerprint

Dive into the research topics of 'Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange'. Together they form a unique fingerprint.

Cite this