An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks

被引:13
|
作者
Kim, Intae [1 ]
Hwang, SeongOun [1 ]
机构
[1] Hongik Univ, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
cryptography; broadcast encryption; identity-based encryption; sensor network; CIPHERTEXTS; PRIVACY;
D O I
10.1587/transcom.E96.B.891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many broadcast encryption schemes have been proposed for conventional networks. However, those schemes are not suitable for wireless sensor networks, which have very limited resources such as communication, computation, and storage. In this paper, we propose an efficient and practical identity-based broadcast encryption scheme for sensor networks by exploiting the characteristics of sensor networks: in the deployment stage, the set of neighboring sensor nodes are determined and most communications are conducted among the neighbors due to radio power limitations of the nodes. The proposed scheme features the following achievements: (1) all of the public keys and private keys are of constant size; (2) it satisfies all the security requirements for sensor networks. The proposed scheme is optimal in the sense that it requires no pairing operation when adopting pre-computation.
引用
收藏
页码:891 / 895
页数:5
相关论文
共 50 条
  • [1] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    [J]. AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [2] An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
    CHENG Hong-bing 1
    2.College of Information Engineering
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 31 - 38
  • [3] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [4] A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks
    Feng, Meng
    Lai, Chin-Feng
    Liu, Hong
    Qi, Rongxin
    Shen, Jian
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1303 - 1311
  • [5] An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks
    Kim, In Tae
    Hwang, Seong Oun
    Kim, Seungwoon
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2012, 14 (1-2) : 27 - 39
  • [7] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks
    Yang, Geng
    Rong, Chunming
    Veigner, Christian
    Wang, Jiangtao
    Cheng, Hongbing
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
  • [8] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [9] Identity-based encryption for sensor networks
    Oliveira, Leonardo B.
    Dahab, Ricardo
    Lopez, Julio
    Daguano, Felipe
    Loureiro, Antonio A. F.
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 290 - +
  • [10] Lightweight identity-based broadcast encryption over wireless ad hoc Networks
    Yuan, Chun
    Gao, Hongyang
    Zhou, Wenshuo
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,