An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks

被引:7
|
作者
Li-Ping Z. [1 ]
Yi W. [2 ]
机构
[1] Lab. of information security, College of Computer Science and Technology, China University of Geosciences, Wuhan
[2] Department of information engineering, Wuhan Police Vocation College, Wuhan
来源
Journal of Communications | 2010年 / 5卷 / 08期
关键词
Bilinear map; Key agreement; Modified bilinear inverse Diffe-Hellman problem; Wireless sensor network;
D O I
10.4304/jcm.5.8.620-626
中图分类号
学科分类号
摘要
Providing a suitable key establishment protocol in wireless sensor networks is challenging due to all the characteristics of these networks, such as limitations of power, computation capability and storage resources. This paper presents a novel key agreement protocol for wireless sensor networks. By applying the ID-based technique, a sensor node and a security manager can achieve key exchange and fast authentication. In this protocol the expensive operations are removed from sensor node side and a sensor node needs not to transmit its implicit certificate, so it reduces the energy cost of sensor nodes. We prove the security of our protocol in the random oracle model. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:620 / 626
页数:6
相关论文
共 50 条
  • [41] ID-based authenticated group key agreement from bilinear maps
    Xixiang Lv
    Hui Li
    Frontiers of Computer Science in China, 2010, 4 : 302 - 307
  • [42] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [43] ID-based tripartite key agreement protocol with pairings
    Liu, SG
    Zhang, FG
    Chen, KF
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 136 - 136
  • [44] ID-based authenticated group key agreement from bilinear maps
    Lv, Xixiang
    Li, Hui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (02): : 302 - 307
  • [45] An ID-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks
    Zhang Li-Ping
    Wang Yi
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [46] An Authenticated Key Agreement Scheme for Wireless Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2014, 3 (03): : 181 - 206
  • [47] ID-based Key Management Strategies of Clustering Wireless Sensor Networks
    Zhang, Zhiming
    Deng, Jiangang
    Jiang, Changgen
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3105 - +
  • [48] An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 32 - 37
  • [49] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
  • [50] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Moon, Sangjae
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +