An Improved ID-Based Key Management Scheme in Wireless Sensor Network

被引:0
|
作者
Chatterjee, Kakali [1 ]
De, Asok [2 ]
Gupta, Daya [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Engn, Delhi, India
[2] Ambedkar Inst Adv Commun Technol & Res, Delhi, India
关键词
Wireless Sensor Network (WSN); Bilinear Pairings; ID-based Encryption; Elliptic Curve Cryptography (ECC); CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Key management is one of the critical areas in WSN as limited resources of sensor nodes restrict the use of conventional security techniques. Most of the sensor networks use shared key among all the nodes to make communicational overhead minimal. But it is vulnerable to many attacks like stolen-verifier attack, replay attack, node-compromise attack etc. In this paper, we propose an efficient ID-based key management scheme using bilinear pairings. Our ECC based scheme requires light computational and communicational load and resist the major attacks in Wireless Sensor Network.
引用
收藏
页码:351 / 359
页数:9
相关论文
共 50 条
  • [21] A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
    Shen, Limin
    Ma, Jianfeng
    Liu, Ximeng
    Wei, Fushan
    Miao, Meixia
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 546 - 554
  • [22] An efficient ID-based bilinear key predistribution scheme for distributed sensor networks
    Dai, Tran Thanh
    Hieu, Cao Trong
    Hong, Choong Seon
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 260 - 269
  • [23] AN ID-BASED MULTIPLE AUTHENTICATION SCHEME AGAINST ATTACKS IN WIRELESS SENSOR NETWORKS
    Peng, Siwei
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1042 - 1045
  • [24] An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
    Qu, Juan
    Zou, Li-Min
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2013, 2013
  • [25] Ternary polynomial based key management scheme for wireless sensor network
    Guan, Z.-T., 1600, Editorial Board of Journal on Communications (34):
  • [26] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +
  • [27] ID-based Key Management Scheme using Threshold Decryption for OPMD Environment
    Lee, Hoonjung
    Kim, Junghoon
    Son, Junggab
    Kim, Sangjin
    Oh, Heekuck
    2012 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2012, : 733 - +
  • [28] A Hybrid Key Management Scheme for Wireless Sensor Network
    Han, Yanyan
    He, Yanru
    Liu, Peihe
    Yan, Xiaoxuan
    Li, Na
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 347 - 364
  • [30] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266