期刊文献+

基于IBE算法的无线传感器网络加密方法研究 被引量:8

A Novel Encryption Scheme for Wireless Sensor Networks Based on Identity-Based Encryption
下载PDF
导出
摘要 由于无线传感器网络在电源、计算能力、内存容量和易受攻击等方面的局限性,传统的网络密钥分配和管理方法已不适用。目前人们提出了随机分配等基于对称密钥系统的加密方法。文中试图探讨基于非对称密钥系统的方法。从身份标识的密钥体系IBE(Identity-Based Encryption)出发,给出了一种适用于无线传感器网络的密钥分配和管理方法。首先简要介绍基于身份标识的密钥体系,特别是Boneh-Franklin算法,然后给出密钥分配和加密方法,并从算法的复杂性、安全性、健壮性和内存需求等方面,与随机算法、RAS算法等进行分析比较,应用仿真平台TinyOS的实验结果表明了文中推出方法的可行性和有效性,显示了良好的综合性能,为无线传感器网络的加密提供了新的手段。 It is an important challenge to find out suitable key establishment scheme for wireless sensor networks due to limitations of power,computation capability and storage resources. Many schemes based on random predistrubution technique and public key cryptography are investigated. Recently ,a practical identity-based encryption technique is proposed. In this paper,we present an identity-based encryption scheme for wireless sensor networks. We review identity-based encryption and decryption first,particularly ,the Boneh-Franklin algorithms. Then we describe a novel approach for encryption in wireless sensor networks based on the basic Boneh-Franklin algorithm. We discuss the efficiency and security of our scheme by comparing with random key assignment technique and asymmetric key technique. Analysis shows that our scheme has some advantages in terms of key management, storage requirement and security. It provides a new approach for encryption in wireless sensor networks.
出处 《南京邮电大学学报(自然科学版)》 EI 2007年第4期1-7,23,共8页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 江苏省'青蓝工程'基金(KZ0040704006) 南京邮电大学'攀登计划'基金(05KJD520144)资助项目
关键词 网络安全 IBE 无线传感器网络 Boneh-Franklin算法 TINYOS Network security Identity-Based Encryption Wireless sensor network Boneh-Franklin algo-rithm TinyOS
  • 相关文献

参考文献20

  • 1AKYILDIZ I F.Wireless sensor networks:A survey[J].Computer Networks,2002,38(4):393-422. 被引量:1
  • 2LIU D,NING P,LI R.Establishing pairwise keys in distributed sensor networks[J].ACM Trans on Information and System Security,2005,8(1):41-47. 被引量:1
  • 3DU W,DENG J,HAN Y S,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Trans on Information and System Security,2005,8(2):228-258. 被引量:1
  • 4ANDERSON R,KUHN M.Tamper resistance-A cautionary note[C]//Proceedings of the 2nd Usenix Workshop on Electronic Commerce.1996:1-11. 被引量:1
  • 5ESCHENAUER L,GLIGOR V D.A key-management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington,DC,USA,2002:41-47. 被引量:1
  • 6LIU D,NING P.Multi-level μ TESLA:Broadcast authentication for distributed sensor networks[J].ACM Trans on Embedded Computing Systems,2004,3(4):800-836. 被引量:1
  • 7PIETRO R D,MANCINI L V,ANDMEI A.Random key assignment for secure wireless sensor networks[C]//ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03).Fairfax,Virgina,2003:62-71. 被引量:1
  • 8CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//IEEE Symposium on Research in Security and Privacy.Berkeley,CA,USA,2003:197-213. 被引量:1
  • 9LIU D,NING P.Location-based pairwise key establishments for static sensor networks[C]//ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03).Fairfax,Virgina,USA,2003:72-82. 被引量:1
  • 10GANESAN P,ENUGOPALAN R,PEDDABACHAGARI P,et al.Analyzing and modeling encryption overhead for sensor network nodes[C]//Proceedings of the 1st ACM internationalworkshop on wireless sensor networks and applications.San Diego,California,USA,2003. 被引量:1

同被引文献92

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部