Identity-based Authentication protocol with Paring of Tate on WSN

被引:0
|
作者
Wang Wei-hong [1 ]
Cu Yi-ling [1 ]
Chen Tie-ming [1 ]
机构
[1] Zhejiang Univ Technol, Sch Software, Hangzhou, Zhejiang, Peoples R China
关键词
WSN; ECC; Bilinear Maps; identity-based authentication scheme; TinyOs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Identity cryptography is widely used in Security Authentication. This paper proposes a standard identity-based authentication scheme, and also proves the security of the scheme under passive attack. On the basis of ECC and Bilinear Maps, paper implements the authentication protocol in the platform of TinyOs. Finally, paper analyzes its result and proves its feasibility.
引用
收藏
页码:4599 / 4602
页数:4
相关论文
共 50 条
  • [1] Identity-based authentication protocol for grid
    Li Hongwei
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 860 - 865
  • [2] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    [J]. ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [3] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [4] An Identity-Based Authentication Protocol for Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    [J]. 2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [5] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [6] Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC
    Kumar, Vivek
    Ray, Sangram
    Sadhukhan, Dipanwita
    Karmakar, Jayashree
    Dasgupta, Mou
    [J]. SECURITY AND PRIVACY, 2023, 6 (03):
  • [7] An Identity-Based Authentication Protocol for Clustered ZigBee Network
    Chen, Wei
    Zhang, Xiaoshuan
    Tian, Dong
    Fu, Zetian
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2010, 6216 : 503 - 510
  • [8] Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 549 - +
  • [9] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [10] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    [J]. PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95