Online citations, reference lists, and bibliographies.
← Back to Search

Implementation Of Node Authentication For WSN Using Hash Chains

A. H. Moon, U. Iqbal, G. M. Bhat
Published 2016 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Abstract This paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without using any digital signature algorithm or any public key cryptography. The usage of hidden generator point derived from hash-chains provides defense against a man-in-the-middle attack which is prominent in ECDH (Elliptical Curve Diffie-Hellman) due to lack of entity authentication. The authentication protocol has been simulated on Tossim and its performance bench marking has also been carried out.
This paper references

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar