Implementation of Node Authentication for WSN Using Hash Chains
This paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains...
Saved in:
Published in | Procedia computer science Vol. 89; pp. 90 - 98 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without using any digital signature algorithm or any public key cryptography. The usage of hidden generator point derived from hash-chains provides defense against a man-in-the-middle attack which is prominent in ECDH (Elliptical Curve Diffie-Hellman) due to lack of entity authentication. The authentication protocol has been simulated on Tossim and its performance bench marking has also been carried out. |
---|---|
ISSN: | 1877-0509 1877-0509 |
DOI: | 10.1016/j.procs.2016.06.013 |