Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network

被引:0
|
作者
Shui, Guohong [1 ,2 ,3 ]
Chen, Ming [4 ]
机构
[1] Chongqing Univ, Coll Resources & Environm, Chongqing 400044, Peoples R China
[2] State Key Lab Coal Mine Disaster Dynam & Control, Chongqing 400030, Peoples R China
[3] Chongqing Univ, State & Local Joint Engn Lab Methane Drainage Com, Chongqing 400030, Peoples R China
[4] Yichun Univ, Coll Math & Comp Sci, Yichun 336000, Jiangxi, Peoples R China
来源
DISASTER ADVANCES | 2012年 / 5卷
基金
中国国家自然科学基金;
关键词
wireless sensor network; identity-based cryptography; elliptic curve; discrete logarithm problem; authenticated key agreement; random oracle model; PROTOCOLS;
D O I
暂无
中图分类号
P [天文学、地球科学];
学科分类号
07 ;
摘要
The computing power, the storage capacity and the communication bandwidth of the sensor nodes all are low, so it is necessary to realize mutual certification among nodes and key agreement, and to avoid relevant issues, such as storing large amounts of symmetric key, managing public key certificate, and high costs for certificate verification. Accordingly, an identity-based authenticated key agreement (no certificate management) for wireless sensor network is proposed. The new scheme, based on the elliptic curve discrete logarithm problem, does not use bilinear pairing, so its computational costs and the security assumptions are effectively reduced. The new protocol is provably secure in the random oracle model. The paper shows that the computational costs and the communication costs in the new scheme are relatively lower, and it meets the requirements of sensor network applications.
引用
收藏
页码:187 / 195
页数:9
相关论文
共 50 条
  • [21] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [22] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    ShengBao Wang
    ZhenFu Cao
    ZhaoHui Cheng
    Kim-Kwang Raymond Choo
    [J]. Science in China Series F: Information Sciences, 2009, 52 : 1358 - 1370
  • [23] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia, Song
    Quan, Jian-Xiao
    Han, Wen-Bao
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [24] New Secure Identity-Based and Certificateless Authenticated Key Agreement Protocols Without Pairings
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 188 - 192
  • [25] An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
    CHENG Hong-bing 1
    2.College of Information Engineering
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 31 - 38
  • [26] Secure and Authenticated Key Agreement Protocol with Minimal Complexity of Operations in the Context of Identity-Based Cryptosystems
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [27] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [28] An efficient identity-based tripartite authenticated key agreement protocol
    Zuowen Tan
    [J]. Electronic Commerce Research, 2012, 12 : 505 - 518
  • [29] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [30] An efficient identity-based tripartite authenticated key agreement protocol
    Tan, Zuowen
    [J]. ELECTRONIC COMMERCE RESEARCH, 2012, 12 (04) : 505 - 518