CPK-Based Key-Establishment and Authentication Protocol

Abstract

Wireless sensor networks are confronted with unique challenges. Key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose CPK-based authentication protocol as the security scheme, which can achieve the key establishment and security authentication. In contrast to previous key-establishment solutions, our approaches need small storage space, and can gain stronger security and reasonable performance efficiency.

1 Figure or Table

Cite this paper

@article{FengYu2008CPKBasedKA, title={CPK-Based Key-Establishment and Authentication Protocol}, author={Lei Feng-Yu and Cui Guo-hua and Duanmu Qing-Feng and Zhang Sha-Sha}, journal={2008 4th International Conference on Wireless Communications, Networking and Mobile Computing}, year={2008}, pages={1-4} }