International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 187 - Number 3 |
Year of Publication: 2025 |
Authors: Aline Zebaze Tsague, Elie Tagne Fute |
![]() |
Aline Zebaze Tsague, Elie Tagne Fute . An Authenticated Key Agreement Scheme for Securing In-Network Communication for Constrained Network Devices. International Journal of Computer Applications. 187, 3 ( May 2025), 9-16. DOI=10.5120/ijca2025924814
This paperproposes using an ephemeral key-based encryption scheme derived from the Elliptic Curve Diffie-Hellman (ECDH) key exchange scheme to establish a secure communication link between constrained nodes of a hierarchical sensor network. Wireless sensor networks (WSN) consist of a collection of autonomous sensor nodes, interconnected via wireless links and deployed on a geographically limited environment. Regardless of the application for which a WSN can be deployed, security remains one of its main current challenges. The proposed approach is here applied not only to privacy and mutual authentication between the sensors and the base station, but also to the minimization of computational and communication overhead by employing the EC point multiplication from ECC while providing a strong security especially forward secrecy. Security analysis of the proposed scheme shows that it relies on use of short-term key-based encryption and also the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP) and provides a good number of security properties. With the performance analysis performed, it’s shown that the proposed scheme presents the merits of being purely autonomous and lightweight in terms of computational cost and number of communication passes necessary to run its operations.