Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks

被引:8
作者
Yasmin, Rehana [1 ]
Ritter, Eike [1 ]
Wang, Guilin [2 ]
机构
[1] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
[2] Huawei Int Pte Ltd, Singapore 117674, Singapore
基金
英国工程与自然科学研究理事会;
关键词
One-pass key establishment; ID-based key establishment; Authenticated key establishment; Pairing-free; Provable security; AGREEMENT PROTOCOLS; IMPLEMENTATION;
D O I
10.1007/s10207-013-0224-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing efficient as well as secure cryptographic protocols for resource-constrained applications is a challenging task. In this paper, we formally analyze the security of an efficient one-pass authenticated key establishment protocol, the 1P-AKE protocol, which is primarily proposed for resource-constrained sensor nodes devices in wireless sensor networks (WSNs). In contrast to the existing identity-based one-pass key establishment protocols, the 1P-AKE protocol does not require any bilinear pairing computation in order to establish a key. This feature makes it really attractive for resource-constrained application environments, such as WSNs, where pairing computations are too expensive. We show that in the random oracle model, the 1P-AKE protocol is a secure authenticated one-pass key establishment protocol under the computational Diffie-Hellman assumption. The performance of the 1P-AKE protocol is also discussed and compared with the existing relevant protocols.
引用
收藏
页码:453 / 465
页数:13
相关论文
共 29 条
  • [1] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [2] EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN WIRELESS SENSORS
    Aranha, Diego F.
    Dahab, Richardo
    Lopez, Julio
    Oliveira, Leonardo B.
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (02) : 169 - 187
  • [3] Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
  • [4] Benits Jr W., 2004, 2004071 CRYPT EPR AR
  • [5] Beuchat J.L., 2010, 2010354 CRYPT EPR AR
  • [6] Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
  • [7] IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    Cao, Xuefei
    Kou, Weidong
    Dang, Lanjun
    Zhao, Bin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 659 - 667
  • [8] Chalkias K, 2008, COMM COM INF SC, V23, P227
  • [9] Chen LQ, 2008, LECT NOTES COMPUT SC, V5209, P1, DOI 10.1007/978-3-540-85538-5_1
  • [10] Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891