ID-based sensor node authentication for multi-layer sensor networks

作者: Soonhwa Sung , Jaecheol Ryou , None

DOI: 10.1109/JCN.2014.000065

关键词:

摘要: Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number ongoing problems. This paper describes how identificatio n (ID)- based node authentication can be used to solve key agreement problem three-layer interaction. The scheme uses novel se- curity mechanism that considers characteristics, architecture, vulnerability sensors, provides an ID-based does not require expensive certificate s. routing process using simple ID suit- able for low power exposure, proposes authentication. method achieves low-cost communica- tions with efficient protocol. Results from this study dem on- strates it improves performance under different densities, reduces computational cost encryption decryption.

参考文章(24)
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Brian J. Matt, David W. Carman, Peter S. Kruus, CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY ,(2000)
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs Lecture Notes in Computer Science. pp. 119- 132 ,(2004) , 10.1007/978-3-540-28632-5_9
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Jeremy Horwitz, Ben Lynn, Toward Hierarchical Identity-Based Encryption international cryptology conference. pp. 466- 481 ,(2002) , 10.1007/3-540-46035-7_31
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7
Florian Hess, Efficient Identity Based Signature Schemes Based on Pairings selected areas in cryptography. pp. 310- 324 ,(2002) , 10.1007/3-540-36492-7_20
Geng YANG, Chun-ming RONG, Christian VEIGNER, Jiang-tao WANG, Hong-bing CHENG, Identity-based key agreement and encryption for wireless sensor networks The Journal of China Universities of Posts and Telecommunications. ,vol. 13, pp. 54- 60 ,(2006) , 10.1016/S1005-8885(07)60034-X
Soonhwa Sung, Confidential aggregation for wireless transmissions international conference on information networking. pp. 390- 394 ,(2014) , 10.1109/ICOIN.2014.6799711
Barry Doyle, Stuart Bell, Alan F Smeaton, Kealan McCusker, Noel E O'Connor, Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks The Computer Journal. ,vol. 49, pp. 443- 453 ,(2006) , 10.1093/COMJNL/BXL023