An Identity-Based Authentication Protocol for Clustered ZigBee Network

被引:0
|
作者
Chen, Wei [1 ]
Zhang, Xiaoshuan [1 ]
Tian, Dong [1 ]
Fu, Zetian [1 ]
机构
[1] China Agr Univ, Coll Informat & Elect Engn, Beijing 100083, Peoples R China
关键词
ZigBee network; Security; Identity-based Cryptography; Certificate-Based Cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
ZigBee technology is designed to be used on applications that require low data rate, low-cost, low power consumption. However, the ZigBee networks are vulnerable to various attacks. In this paper, we have proposed an Identity-based authentication protocol for a ZigBee network structured to have multiple clusters consisting of one coordinator and many devices. Further more, we have designed a secure protocol used for exchanging public parameters between two clusters. Our proposal could realize secure, fast, low-cost and scalable authentication between any two nodes in a clustered ZigBee network.
引用
收藏
页码:503 / 510
页数:8
相关论文
共 50 条
  • [31] An Identity-Based Authentication Model for Mobile Agent
    Yu, Yike
    Zheng, Xuefeng
    Zhang, Mingde
    Zhang, Qingguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 475 - 478
  • [32] Identity-Based SIP Authentication and Key Agreement
    Wu ShaoBo
    Li ChengShu
    EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
  • [33] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [34] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [35] Implementation and Testing of an Identity-based Authentication System
    Zhao, Guifen
    Hu, Xiangyi
    Li, Ying
    Du, Liping
    Zhao, Guifen
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 424 - 427
  • [36] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [37] A New Identity-based Authentication Scheme for SIP
    Peng, Shengbo
    Ruan, Ou
    Zhou, Jing
    Chen, Zaixing
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
  • [38] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [39] Identity-based proof of retrievability meets with identity-based network coding
    Chen, Yixin
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3067 - 3083
  • [40] Identity-based proof of retrievability meets with identity-based network coding
    Yixin Chen
    Jinyong Chang
    Cluster Computing, 2022, 25 : 3067 - 3083