Identity-based key agreement and encryption for wireless sensor networks

被引:10
|
作者
VEIGNER Christian [1 ]
机构
[1] Department of Electrical and Computer Engineering University of Stavanger N-4036 Norway
关键词
identity-based cryptography; security; WSN;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
It is an important challenge to find out suitable cryptography for wireless sensor networks (WSN) because of the limitations of power, computation capability, and storage resources. Many schemes based on public or symmetric key cryptography are investigated. Recently, a practical identity-based encryption technique is proposed. In this article, we present an identity-based key agreement and encryption scheme for WSNs. This scheme is an elliptic curve cryptography type algorithm. First, we briefly review regarding identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms. Then we describe a key agreement and encryption scheme on the basis of the Boneh-Franklin algorithms for WSNs. We discuss the efficiency and security of our scheme by comparing it with traditional public key technique and symmetric key technique.
引用
收藏
页码:54 / 60
页数:7
相关论文
共 50 条
  • [41] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [42] Implementing Identity-based Key Agreement in Embedded Devices
    Schmid, Giovanni
    Rossi, Francesco
    [J]. PECCS 2015 PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2015, : 117 - 123
  • [43] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [44] PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks
    Bala, Suman
    Sharma, Gaurav
    Verma, Anil K.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) : 995 - 1012
  • [45] Lightweight Key Agreement for Wireless Sensor Networks
    Mesit, Jaruwan
    Brust, Matthias R.
    Bouvry, Pascal
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 432 - 437
  • [46] Identity-based key agreement protocols from pairings
    L. Chen
    Z. Cheng
    N. P. Smart
    [J]. International Journal of Information Security, 2007, 6 : 213 - 241
  • [47] PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks
    Suman Bala
    Gaurav Sharma
    Anil K. Verma
    [J]. Wireless Personal Communications, 2016, 87 : 995 - 1012
  • [48] Identity-based key agreement with unilateral identity privacy using pairings
    Cheng, Zhaohui
    Chen, Liqun
    Comley, Richard
    Tang, Qiang
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 202 - 213
  • [49] Threshold and identity-based key management and authentication for wireless ad hoc networks
    Deng, HM
    Mukherjee, A
    Agrawal, DP
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 107 - 111
  • [50] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    [J]. 2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109