An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks

被引:7
|
作者
Li-Ping Z. [1 ]
Yi W. [2 ]
机构
[1] Lab. of information security, College of Computer Science and Technology, China University of Geosciences, Wuhan
[2] Department of information engineering, Wuhan Police Vocation College, Wuhan
来源
Journal of Communications | 2010年 / 5卷 / 08期
关键词
Bilinear map; Key agreement; Modified bilinear inverse Diffe-Hellman problem; Wireless sensor network;
D O I
10.4304/jcm.5.8.620-626
中图分类号
学科分类号
摘要
Providing a suitable key establishment protocol in wireless sensor networks is challenging due to all the characteristics of these networks, such as limitations of power, computation capability and storage resources. This paper presents a novel key agreement protocol for wireless sensor networks. By applying the ID-based technique, a sensor node and a security manager can achieve key exchange and fast authentication. In this protocol the expensive operations are removed from sensor node side and a sensor node needs not to transmit its implicit certificate, so it reduces the energy cost of sensor nodes. We prove the security of our protocol in the random oracle model. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:620 / 626
页数:6
相关论文
共 50 条
  • [1] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [2] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    Journal of Shanghai Jiaotong University, 2007, (02) : 247 - 249
  • [3] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [4] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [5] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [6] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [7] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang
    Bin, Xie
    Qiang, He Z.
    Quan, Jin Y.
    Open Cybernetics and Systemics Journal, 2014, 8 (01): : 98 - 103
  • [8] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [9] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [10] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654