Identity-based key agreement and encryption for wireless sensor networks

被引:10
|
作者
VEIGNER Christian [1 ]
机构
[1] Department of Electrical and Computer Engineering University of Stavanger N-4036 Norway
关键词
identity-based cryptography; security; WSN;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
It is an important challenge to find out suitable cryptography for wireless sensor networks (WSN) because of the limitations of power, computation capability, and storage resources. Many schemes based on public or symmetric key cryptography are investigated. Recently, a practical identity-based encryption technique is proposed. In this article, we present an identity-based key agreement and encryption scheme for WSNs. This scheme is an elliptic curve cryptography type algorithm. First, we briefly review regarding identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms. Then we describe a key agreement and encryption scheme on the basis of the Boneh-Franklin algorithms for WSNs. We discuss the efficiency and security of our scheme by comparing it with traditional public key technique and symmetric key technique.
引用
收藏
页码:54 / 60
页数:7
相关论文
共 50 条
  • [1] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks
    Yang, Geng
    Rong, Chunming
    Veigner, Christian
    Wang, Jiangtao
    Cheng, Hongbing
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
  • [2] An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
    CHENG Hong-bing 1
    2.College of Information Engineering
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 31 - 38
  • [3] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [4] Identity-based encryption for sensor networks
    Oliveira, Leonardo B.
    Dahab, Ricardo
    Lopez, Julio
    Daguano, Felipe
    Loureiro, Antonio A. F.
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 290 - +
  • [5] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [6] AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
    Yang Lijun
    Wu Meng
    Ding Chao
    [J]. Journal of Electronics(China), 2013, 30 (06) : 574 - 586
  • [7] Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network
    Shui, Guohong
    Chen, Ming
    [J]. DISASTER ADVANCES, 2012, 5 : 187 - 195
  • [8] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [9] TinyIBE: Identity-Based Encryption for Heterogeneous Sensor Networks
    Szczechowiak, Piotr
    Collier, Martin
    [J]. PROCEEDINGS OF THE 2009 FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2009, : 349 - 354
  • [10] TinyIBE: Identity-Based Encryption for Heterogeneous Sensor Networks
    Szczechowiak, Piotr
    Collier, Martin
    [J]. 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (ISSNIP 2009), 2009, : 337 - 342