期刊文献+

基于身份加密的无线传感器网络密钥分配方法 被引量:60

A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms
下载PDF
导出
摘要 由于无线传感器网络在电源、计算能力和内存容量等方面的局限性,传统的网络密钥分配和管理方法已不适用.本文从基于身份密钥体系出发,提出了一种适用于无线传感器网络的密钥预分配方法.首先简要介绍了身份密钥体系,特别是Boneh-Franklin算法,然后基于身份密钥系统和Diffie-Hellman算法,给出我们的密钥分配方法,并从方法的复杂性、安全性、健壮性和内存需求等方面,与随机算法等进行了分析比较,结果表明我们的算法在这些方面有一定的优势.最后我们讨论了可进一步研究的内容. It is an important challenge to find out a suitable key establishment scheme for wireless sensor networks due to limitations of power, computation capability and storage resources. Many schemes based on random predistrubution technique and public key cryptography are investigated. Recently, a practical identity-based encryption technique is proposed. This paper presents an identity-based key establishment scheme for key predistribution and exchange in wireless sensor networks. It reviews first the identity-based encryption, particularly, the Boneh-Franklin algorithms. It describes a novel key establishment scheme based on the basic Boneh-Franklin and Diffie-Hellman algorithms. It discusses the efficiency and security of our scheme by comparing with random key assignment technique and symmetric key technique.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第1期180-184,共5页 Acta Electronica Sinica
基金 江苏省自然科学基金重点预研项目(No.BK2004218) 江苏省"青蓝工程"基金(No.KZ0040704006) 南京邮电大学"攀登计划"基金(No.05KJD520144) 江苏省"六大人才高峰"基金(No.06-E-044)
关键词 基于身份标识密钥系统 网络安全 DIFFIE-HELLMAN算法 无线传感器网络 identity-based cryptography network security Diffie-Hellman key exchange wireless sensor network
  • 相关文献

参考文献19

  • 1Akyildiz I F,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422. 被引量:1
  • 2Perrig A,et al.TESLA:multicast source authentication transform[EB/OL].IRTF draft,ftp://ftp.rfc-editor.org/in-notes/rfc4082.txt,2000-07-20. 被引量:1
  • 3Perrig A,et al.SPINS:security protocols for sensor networks[J].Wireless Networks,2002,8(7):521-534. 被引量:1
  • 4Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77. 被引量:1
  • 5Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258. 被引量:1
  • 6Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11. 被引量:1
  • 7Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47. 被引量:1
  • 8Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71. 被引量:1
  • 9Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213. 被引量:1
  • 10Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13. 被引量:1

同被引文献758

引证文献60

二级引证文献386

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部