Sciweavers

Share
MOBIHOC
2005
ACM

An efficient scheme for authenticating public keys in sensor networks

10 years 1 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of some publickey algorithms, such as Elliptic Curve Cryptography (ECC), is already close to being practical on sensor nodes. However, the energy consumption of PKC is still expensive, especially compared to symmetric-key algorithms. To maximize the lifetime of batteries, we should minimize the use of PKC whenever possible in sensor networks. This paper investigates how to replace one of the important PKC operations?the public key authentication?with symmetric key operations that are much more efficient. Public key authentication is to verify the authenticity of another party's public key to make sure that the public key is really owned by the person it is claimed to belong to. In PKC, this operation involves an expensive signature verification on a certificate. We propose an efficient alternative that uses...
Wenliang Du, Ronghua Wang, Peng Ning
Added 24 Dec 2009
Updated 24 Dec 2009
Type Conference
Year 2005
Where MOBIHOC
Authors Wenliang Du, Ronghua Wang, Peng Ning
Comments (0)
books