AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS

被引:0
|
作者
Yang Lijun [1 ]
Wu Meng [2 ,3 ]
Ding Chao [1 ]
机构
[1] College of Computer Science & Technology,Nanjing University of Posts and Telecommunications
[2] College of Telecommunication & Information Engineering,Nanjing University of Posts and Telecommunications
[3] Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education
基金
中国国家自然科学基金;
关键词
Large scale Wireless Sensor Networks(WSNs); Network security; Key agreement; Identity-based cryptography;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN918.82 [];
学科分类号
080202 ; 0839 ; 1402 ;
摘要
To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks(WSNs),an Identity-Based Key Agreement Scheme(IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman(ECDH).IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption.Theoretical analysis indicates that comparing to the random key pre-distribution techniques,IBKAS achieves significant improvement in key connectivity,communication overhead,memory occupation,and security strength,and also enables efficient secure rekeying and network expansion.Furthermore,we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes,and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.
引用
收藏
页码:574 / 586
页数:13
相关论文
共 50 条
  • [31] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
  • [32] Identity-based key management for wireless sensor networks using lagrange interpolation
    Wan, Changsheng
    Zhang, Juan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3713 - 3723
  • [33] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    [J]. AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [34] Identity - Based Multiple Key Agreement Scheme
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
  • [35] Identity-based key agreement protocols in a multiple PKG environment
    Lee, H
    Kim, D
    Kim, S
    Oh, H
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 877 - 886
  • [36] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [37] Identity-based fault-tolerant conference key agreement
    Yi, X
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 170 - 178
  • [38] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [39] An identity-based group key agreement protocol from pairing
    Wang, Hongji
    Yao, Gang
    Jiang, Qingshan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 532 - +
  • [40] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217