For MSP430, we used our lightweight implementation of elliptic curve primitives and
ECDH algorithm.
(ii) ECDSA is used to prevent man-in-the-middle attack that
ECDH suffers from, to realize the mutual authentication.
Now, computing the
ECDH public key for node i is as follows:
At the end of the authentication scheme there is a key establishment part which extends the security strength of the standard
ECDH key agreement by using mutually authenticated keying materials (i.e., [Cert.sub.U] and s).
FA stores the [ID.sub.HA] and aP received from MU for further communication, selects a random number b, and computes the bP value on E using
ECDH. FA then sends [ID.sub.FA], A, [c.sub.1], [c.sub.2], aP, bP, and [N'.sub.MU] to HA.
Figure 4 represents the simulation results for
ECDH based key management scheme [6].
The Communication and computation of tree based
ECDH depends on trees height, balance of key tree, location of joining tree and leaving nodes.
[10] Yoon EJ, Yoo KY., "Cryptanalysis of DS-SIP authentication scheme using
ECDH [C]," in Proc.
propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (
ECDH) key exchange and hash chain.
Based on that elliptic curve Diffie-Hellman (
ECDH) KAP was developed.