J. KIMS Technol Search

CLOSE


Journal of the Korea Institute of Military Science and Technology 2008;11(5):58-70.
Public Key Authentication using(t, n) Threshold Scheme for WSN
Jun-Yop Kim, Wan-Ju Kim, Soo-Jin Lee
Korea National Defense University
(t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증
김준엽, 김완주, 이수진
국방대학교
Abstract
Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.
Key Words: Wireless Sensor Notwork, Public Key Authentication, Threshold Scheme, Key Management Protocol
TOOLS
Share :
Facebook Twitter Linked In Google+ Line it
METRICS Graph View
  • 314 View
  • 0 Download
Related articles in J. KIMS Technol.


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2024 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next