AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS

被引:0
|
作者
Yang Lijun [1 ]
Wu Meng [2 ,3 ]
Ding Chao [1 ]
机构
[1] College of Computer Science & Technology,Nanjing University of Posts and Telecommunications
[2] College of Telecommunication & Information Engineering,Nanjing University of Posts and Telecommunications
[3] Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education
基金
中国国家自然科学基金;
关键词
Large scale Wireless Sensor Networks(WSNs); Network security; Key agreement; Identity-based cryptography;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN918.82 [];
学科分类号
080202 ; 0839 ; 1402 ;
摘要
To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks(WSNs),an Identity-Based Key Agreement Scheme(IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman(ECDH).IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption.Theoretical analysis indicates that comparing to the random key pre-distribution techniques,IBKAS achieves significant improvement in key connectivity,communication overhead,memory occupation,and security strength,and also enables efficient secure rekeying and network expansion.Furthermore,we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes,and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.
引用
收藏
页码:574 / 586
页数:13
相关论文
共 50 条
  • [41] Identity - Based Multiple Key Agreement Scheme
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
  • [42] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [43] Identity-based key agreement protocols in a multiple PKG environment
    Lee, H
    Kim, D
    Kim, S
    Oh, H
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 877 - 886
  • [44] Identity-based fault-tolerant conference key agreement
    Yi, X
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 170 - 178
  • [45] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [46] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [47] An efficient identity-based tripartite authenticated key agreement protocol
    Tan, Zuowen
    [J]. ELECTRONIC COMMERCE RESEARCH, 2012, 12 (04) : 505 - 518
  • [48] Security of two-party identity-based key agreement
    Boyd, C
    Choo, KKR
    [J]. PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 229 - 243
  • [49] An identity-based group key agreement protocol from pairing
    Wang, Hongji
    Yao, Gang
    Jiang, Qingshan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 532 - +
  • [50] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217