Abstract
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.
Publisher
National Institute of Telecommunications
Reference29 articles.
1. W. Diffie and M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
2. L. Harn, M. Mehta, and W.-J. Hsin, "Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm (DSA)", IEEE Communications Letters, vol. 8, no. 3, pp. 198-200, 2004.
3. A.C.-C. Yao and Y. Zhao, "Privacy-preserving Authenticated Key-exchange over Internet", IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 125-140, 2014.
4. T. Yi, M. Shi, and W. Shang, "Personalized Two Party Key Exchange Protocol", in: 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), Las Vegas, USA, pp. 575-579, 2015.
5. A.S. Rawat and M. Deshmukh, "Efficient Extended Diffie-Hellman Key Exchange Protocol", in: 2019 International Conference on Computing, Power and Communication Technologies (GUCON), New Delhi, India, pp. 447-451, IEEE, 2019 (https://ieeexplore.ieee.org/document/8940607).