For MSP430, we used our lightweight implementation of elliptic curve primitives and ECDH
(ii) ECDSA is used to prevent man-in-the-middle attack that ECDH
suffers from, to realize the mutual authentication.
Now, computing the ECDH
public key for node i is as follows:
At the end of the authentication scheme there is a key establishment part which extends the security strength of the standard ECDH
key agreement by using mutually authenticated keying materials (i.e., [Cert.sub.U] and s).
FA stores the [ID.sub.HA] and aP received from MU for further communication, selects a random number b, and computes the bP value on E using ECDH
. FA then sends [ID.sub.FA], A, [c.sub.1], [c.sub.2], aP, bP, and [N'.sub.MU] to HA.
Figure 4 represents the simulation results for ECDH
based key management scheme .
The Communication and computation of tree based ECDH
depends on trees height, balance of key tree, location of joining tree and leaving nodes.
 Yoon EJ, Yoo KY., "Cryptanalysis of DS-SIP authentication scheme using ECDH
[C]," in Proc.
propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (ECDH
) key exchange and hash chain.
Based on that elliptic curve Diffie-Hellman (ECDH
) KAP was developed.