2015
DOI: 10.1007/s11277-015-2626-5
|View full text |Cite
|
Sign up to set email alerts
|

PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks

Abstract: To ensure secure communication between any two entities, authenticated key agreement protocol is the primary step and current research has a lot of contribution in this direction. In this paper, we propose a Pairing Free Identity-based Two-Party Authenticated Key Agreement protocol and gather the implementation results for Wireless Sensor Networks on MICAz mote by using Relic-toolkit cryptographic library. The proposed protocol is efficient as it does not use any pairing operation and only uses three scalar po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(35 citation statements)
references
References 17 publications
0
35
0
Order By: Relevance
“…0:008 ms), and DATA field. The DATA field consists 28 eCK Ã CBDH = = Sun et al 46 eCK Ã GDH = = Bala et al 47 eCK Ã GDH = = Ni-I 48 eCK CDH = = Ni-II 48 eCK GDH = = Islam and Biswas 49 of the 16-bit SERVICE field, the physical service data unit (PSDU) (i.e. the medium-access control (MAC) frame), the 6-bit TAIL field, and the PAD field.…”
Section: Performance Analysesmentioning
confidence: 99%
See 2 more Smart Citations
“…0:008 ms), and DATA field. The DATA field consists 28 eCK Ã CBDH = = Sun et al 46 eCK Ã GDH = = Bala et al 47 eCK Ã GDH = = Ni-I 48 eCK CDH = = Ni-II 48 eCK GDH = = Islam and Biswas 49 of the 16-bit SERVICE field, the physical service data unit (PSDU) (i.e. the medium-access control (MAC) frame), the 6-bit TAIL field, and the PAD field.…”
Section: Performance Analysesmentioning
confidence: 99%
“…Therefore, Bala et al's 47 protocol and our protocol require three and two ECC-based point multiplication operations, respectively, when pre-computation is carried out. Moreover, the security proof of Bala et al's 47 protocol does not take active adversaries into account. Although the message size of our protocol is one point more than that of Bala's protocol, our protocol has less running time than Bala's protocol.…”
Section: Performance Analysesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the results obtained with such solutions and their corresponding suitability for use in WSNs need to be reconsidered with caution. Partially due to this reason, but also aiming at better efficiency, part of the WSN-oriented literature on AKA protocols has shifted to pairing-free, albeit still escrowed, schemes, such as those described in [34][35][36][37] .…”
Section: Related Workmentioning
confidence: 99%
“…In order to avoid this problem and reduce the burden on traditional PKI, identity-based public key cryptography (IBC) and certificateless public key cryptography (CLC) were proposed, where certificate used in PKI is not needed. Recently, many security mechanisms for WSNs using IBC [16,17] or CLC [18,19] have been generated. All the above schemes are homogeneous means that sender and receiver must belong to the same security domain (PKI or IBC or CLC environment).…”
Section: Introductionmentioning
confidence: 99%