Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks

被引:3
作者
Grumazescu, Constantin [1 ]
Pura, Mihai-Lica [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Bucharest, Romania
来源
NEW CONTRIBUTIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, PT 1 | 2015年 / 353卷
关键词
wireless sensor networks; identity based cryptography; distributed cryptographic scheme; hierarchical cryptographic scheme; key escrow; key issuing;
D O I
10.1007/978-3-319-16486-1_94
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There is a major concern in the field of Wireless Sensor Networks regarding information security in very large infrastructures, where classical security models cannot be applied due to the very strict resource constraints of network nodes. For this, identity based cryptographic schemes, distributed key generators and hierarchical security infrastructures have been intensively discussed but, from our knowledge, no proposals have been made that would also cover two very important issues regarding this type of security systems - secure key issuing and key escrow. We are proposing such a security scheme that would benefit from both hierarchical and distributed approaches, with special attention to key escrow and key issuing. Also, we are envisioning some applications that would benefit from such a security scheme.
引用
收藏
页码:949 / 958
页数:10
相关论文
共 15 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], P 2 WORKSH AUSTR INF
  • [3] [Anonymous], 2000C20 SCIC
  • [4] [Anonymous], P 7 INT C SEC CRYPT
  • [5] [Anonymous], ETRI J
  • [6] [Anonymous], CRYPTOLOGY EPRINT AR
  • [7] [Anonymous], 5 INT C NEW TECHN MO
  • [8] [Anonymous], WIRELESS COMMUNICATI
  • [9] [Anonymous], J CRYPTOLOGY
  • [10] [Anonymous], 2006, PRACTICAL HIERARCHIC