An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks

被引:6
|
作者
CHENG Hong-bing 1
2.College of Information Engineering
机构
关键词
identity-based encryption scheme; network security; boneh-franklin algorithms; wireless sensor network;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Security of wireless sensor networks has received considerable attention. It is a critical challenge to find out suitable encryption schemes for wireless sensor networks due to limitations of power, computation capability and storage resources of these networks. Many encryption schemes based on asymmetric and symmetric have been investigated. In this paper, we present an authenticated identity-based key encryption scheme for wireless sensor networks. We first review briefly about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms, then describe an authenticated identity-based key encryption scheme based on Boneh-Franklin algorithms, and finally show the integrity of our scheme and discuss its efficiency and security by comparing it with other asymmetric and symmetric encryption schemes.
引用
收藏
页码:31 / 38
页数:8
相关论文
共 50 条
  • [1] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    [J]. J. China Univ. Post Telecom, 2006, 2 (31-38):
  • [2] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [3] A novel encryption scheme for wireless sensor networks based on identity-based encryption
    Yang, Geng
    Yu, Xiao-Jie
    Wang, Jiang-Tao
    Cheng, Hong-Bing
    [J]. Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7
  • [5] An identity-based authenticated key agreement scheme for heterogeneous sensor networks
    Fu, Xiaojing
    Zhang, Guoyin
    Ma, Chunguang
    [J]. Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 582 - 586
  • [6] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks
    Yang, Geng
    Rong, Chunming
    Veigner, Christian
    Wang, Jiangtao
    Cheng, Hongbing
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
  • [7] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [8] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [9] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [10] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919