A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption

被引:0
|
作者
Liu, Yan [1 ]
Wu, Xiumei [1 ]
Chen, Xuemin [2 ]
机构
[1] Shanghai Second Polytech Univ, Sch Comp & Informat Engn, Shanghai 201209, Peoples R China
[2] Texas Southern Univ, Dept Engn Tech, Houston, TX USA
关键词
wireless sensor network; key distribution; network security; hierarchical identity-based encryption; identity-based encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional method of key distribution does not fit the need to run in wireless sensor network (WSN) due to limitation on energy, computation and memory capacity of WSN. In this paper, we propose a scheme based on Hierarchical Identity-Based Encryption (HIBE) to distribute encrypt key. Comparing with key distribution based on Identity-Based Encryption (IBE), the proposed scheme reduces the computation time and saves memory space of wireless sensor node.
引用
收藏
页码:539 / 543
页数:5
相关论文
共 50 条
  • [1] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [2] An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
    CHENG Hong-bing 1
    2.College of Information Engineering
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 31 - 38
  • [3] A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network
    Yuan, Chi
    Chen, Wenping
    Li, Deying
    [J]. WIRELESS SENSOR NETWORKS (CWSN 2017), 2018, 812 : 44 - 54
  • [5] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks
    Yang, Geng
    Rong, Chunming
    Veigner, Christian
    Wang, Jiangtao
    Cheng, Hongbing
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
  • [6] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [7] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [8] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [9] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78
  • [10] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212