An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks

被引:7
|
作者
Li-Ping Z. [1 ]
Yi W. [2 ]
机构
[1] Lab. of information security, College of Computer Science and Technology, China University of Geosciences, Wuhan
[2] Department of information engineering, Wuhan Police Vocation College, Wuhan
来源
Journal of Communications | 2010年 / 5卷 / 08期
关键词
Bilinear map; Key agreement; Modified bilinear inverse Diffe-Hellman problem; Wireless sensor network;
D O I
10.4304/jcm.5.8.620-626
中图分类号
学科分类号
摘要
Providing a suitable key establishment protocol in wireless sensor networks is challenging due to all the characteristics of these networks, such as limitations of power, computation capability and storage resources. This paper presents a novel key agreement protocol for wireless sensor networks. By applying the ID-based technique, a sensor node and a security manager can achieve key exchange and fast authentication. In this protocol the expensive operations are removed from sensor node side and a sensor node needs not to transmit its implicit certificate, so it reduces the energy cost of sensor nodes. We prove the security of our protocol in the random oracle model. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:620 / 626
页数:6
相关论文
共 50 条
  • [31] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    Hai-Bo Tian
    Willy Susilo
    Yang Ming
    Yu-Min Wang
    Journal of Computer Science and Technology, 2008, 23 : 832 - 842
  • [32] A round-optimal three-party ID-based authenticated key agreement protocol
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2012, 186 (01) : 239 - 248
  • [33] Further analysis of ID-based authenticated group key agreement protocol from bilinear maps
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 295 - 298
  • [34] An Efficient and Secure, ID-based Authenticated, Asymmetric Group Key Agreement Protocol for Ubiquitous Pay-TV Networks
    Khatoon, Shaheena
    Rahman, Sk Md Mizanur
    Tso, Raylin
    Alhamid, Mohammed F.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1387 - 1395
  • [35] Two ID-based authenticated schemes with key agreement for mobile environments
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Lu, Chung-Fu
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 973 - 988
  • [36] Two ID-based authenticated schemes with key agreement for mobile environments
    Chih-Ho Chou
    Kuo-Yu Tsai
    Chung-Fu Lu
    The Journal of Supercomputing, 2013, 66 : 973 - 988
  • [37] An ID-based authenticated dynamic group key agreement with optimal round
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2542 - 2554
  • [38] An ID-based authenticated dynamic group key agreement with optimal round
    TENG JiKai1
    2Graduate University of Chinese Academy of Sciences
    3Faculty of Mathematic and Information Science
    ScienceChina(InformationSciences), 2012, 55 (11) : 2542 - 2554
  • [39] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428
  • [40] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428