Journal of Northeastern University ›› 2011, Vol. 32 ›› Issue (3): 348-351.DOI: -

• OriginalPaper • Previous Articles     Next Articles

Reciprocal authentication based on a conic curve combined public key in wireless sensor networks

Wen, Tao (1); Zhang, Yong (1); Guo, Quan (1); Li, Feng-Kun (1)   

  1. (1) Software Center, Northeastern University, Shenyang 110819, China
  • Received:2013-06-19 Revised:2013-06-19 Published:2013-04-04
  • Contact: Zhang, Y.
  • About author:-
  • Supported by:
    -

Abstract: Comprehensive analysis was conducted on the development trends and deficiencies of a wireless sensor network (WSN) with authentication protocols, especially with regard to encryption, public key cryptography binding, and answer attack modes, to provide location information based on a scheme for reciprocal authentication of personal ID nodes. The scheme utilizes conic curve cryptography (CCC), which is more efficient and easier to use in inverse operations, order computations, and point multiplication computations than elliptic curve cryptography (ECC). Location information introduced into the ID-based scheme makes the protocol more resilient and robust in thwarting new attacks. The protocol was shown to be secure and energy cost analysis of the protocol demonstrated its feasibility.

CLC Number: