Sciweavers

Share
ADHOC
2007

Access control in wireless sensor networks

9 years 1 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ‘‘new’’ nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate be...
Yun Zhou, Yanchao Zhang, Yuguang Fang
Added 08 Dec 2010
Updated 08 Dec 2010
Type Journal
Year 2007
Where ADHOC
Authors Yun Zhou, Yanchao Zhang, Yuguang Fang
Comments (0)
books