AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS

被引:0
作者
Yang Lijun [1 ]
Wu Meng [2 ,3 ]
Ding Chao [1 ]
机构
[1] College of Computer Science & Technology,Nanjing University of Posts and Telecommunications
[2] College of Telecommunication & Information Engineering,Nanjing University of Posts and Telecommunications
[3] Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education
关键词
Large scale Wireless Sensor Networks(WSNs); Network security; Key agreement; Identity-based cryptography;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN918.82 [];
学科分类号
080202 ; 0839 ; 1402 ;
摘要
To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks(WSNs),an Identity-Based Key Agreement Scheme(IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman(ECDH).IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption.Theoretical analysis indicates that comparing to the random key pre-distribution techniques,IBKAS achieves significant improvement in key connectivity,communication overhead,memory occupation,and security strength,and also enables efficient secure rekeying and network expansion.Furthermore,we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes,and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.
引用
收藏
页码:574 / 586
页数:13
相关论文
共 5 条
[1]   高效的标准模型下基于身份认证密钥协商协议 [J].
高志刚 ;
冯登国 .
软件学报, 2011, 22 (05) :1031-1040
[2]   一种有效的无线传感器网络密钥协商方案 [J].
杨庚 ;
程宏兵 .
电子学报, 2008, (07) :1389-1395
[3]  
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks[J] . Leonardo B. Oliveira,Diego F. Aranha,Conrado P.L. Gouvêa,Michael Scott,Danilo F. Camara,Julio López,Ricardo Dahab.Computer Communications . 2010 (3)
[4]  
SPINS: Security Protocols for Sensor Networks[J] . Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler.Wireless Networks . 2002 (5)
[5]  
Identity-Based Encryption from the Weil Pairing .2 Dan Boneh,Matthew Franklin. SIAM Journal on Computing . 2003