Volume 10, Issue 3 (9-2018)                   2018, 10(3): 31-41 | Back to browse issues page

XML Print


1- Department of Communicative Sciences and Disorders, MSU Department of Computational mathematics science and engineering, MSU East Lansing, MI, USA
2- ICT Department, Malek-e-Ashtar University of Technology Tehran, Iran , payandeh@mut.ac.ir
3- Information Systems and Security Lab, Department of Electrical Engineering, Sharif University of Technology Tehran, Iran
Abstract:   (1913 Views)
Security is a critical and vital task in wireless sensor networks (WSNs), therefore different key management systems have been proposed, many of which are based on symmetric primitives. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography (PKC) have those desirable characteristics, but they consume more energy. Recently based on authenticated messages from base station (BS) a new PKC–based key agreement protocol was proposed. We show this method is susceptible to a form of denial of service (DOS) attack where resources of network can be exhausted with bogus messages. Then, we propose two different improvements to solve this vulnerability. Simulation results show that these new protocols retain desirable characteristics of the basic method but solve its deficiencies.
Full-Text [PDF 1036 kb]   (838 Downloads)    
Type of Study: Research | Subject: Network

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.