An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
被引量:8
An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
基金
ThisworkwassupportedbytheNaturalScienceFoundationofJiangsuProvince(BK2004218andBK2003106).
参考文献25
-
1AKYILDIZ I F,SU W,SANKARASUBRAMANIAM Y.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422.
-
2PERRIG A,SZEWCZYK R,WEN V,et al.SPINS:Security protocols for sensor networks[C]//Proceedings of Seventh Annual International Conference on Mobile Computing and Networks,Jul 16-21,2001,Rome,Italy.New York,NY,USA:ACM Press,2001:189-199.
-
3ANDERSON R,KUHN M.Tamper resistance-a cautionary note[C]//Proceedings of the 2nd Usenix Workshop on Electronic Commerce,Nov 18-21,1996,Oakland,CA,USA.SanDiego,CA,USA:USENIX Press,1996:1-11.
-
4XIAO N,WANG Q.Mechanism of authentication and key agreement in WCDMA[J].Journey of Chongqing University of Posts and Telecommunications,2004,16(2):117 -119.
-
5ESCHENAUER L,GL IGOR V D.A key-management scheme for distributed sensor net works[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM Press,2002:41 -47.
-
6DI PIETRO R,MANCINI L V,MEI A.Random key assignment for secure wireless sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:62-71.
-
7CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//Proceedings of IEEE Symposium on Research in Security and Privacy,May 11 -14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213.
-
8LAUTER K.The advantages of elliptic curve cryptography for wireless security[J].IEEE Wireless Communications,2004,11(1):62-67.
-
9DU W,DENG J,HAN Y S,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
-
10BLOM R.An optimal class of symmetric key generation systems[C]//Proceedings of Advances in Cryptology(EUROCRYPT 84),Apr 9-11,1985,Paris,France.Berlin,Germany,Springer,1985:335-338.
同被引文献52
-
1李兴华,马建峰,文相在.基于身份密码系统下Canetti-Krawczyk模型的安全扩展[J].中国科学(E辑),2004,34(10):1185-1192. 被引量:6
-
2陈菲,宋志高,陈克非.无线传感器网络中对密钥管理评估指标研究[J].计算机仿真,2005,22(5):137-140. 被引量:17
-
3柳立峰,邹仕洪,张雷,程时端.基于概率覆盖模型的无线传感器网络密度控制算法[J].北京邮电大学学报,2005,28(4):14-17. 被引量:33
-
4曹晓梅,李成法,叶懋,陈贵海.WSAN网络密钥管理模型的研究[J].计算机应用与软件,2005,22(10):31-33. 被引量:2
-
5杨少春,郎为民,谭珂科.基于密钥预分配的传感器网络加密方案[J].信息工程大学学报,2005,6(4):11-14. 被引量:5
-
6王佳昊,王胜坤,秦志光,李志军.随机预分配密钥在WSN跟踪算法中的应用[J].四川大学学报(工程科学版),2005,37(6):113-119. 被引量:6
-
7任彦,张思东,张宏科.无线传感器网络中覆盖控制理论与算法[J].软件学报,2006,17(3):422-433. 被引量:156
-
8程宏兵,王江涛,杨庚.SPINS安全框架协议研究[J].计算机科学,2006,33(8):106-108. 被引量:10
-
9杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
-
10Gura N,Patel A,Wander A,et al.Comparing Elliptic CurveCryptography and RSA on 8bit CPUs[J].CHES,2004(8):11-13.
引证文献8
-
1WANG Hai-yan WANG Ru-chuan.CPK-based grid authentication:a step forward[J].The Journal of China Universities of Posts and Telecommunications,2007,14(1):26-31. 被引量:4
-
2QIN Ning-ning,ZHANG Lin,SHAN Xiu-ming,XU Bao-guo.Locomotion trajectory with cooperative metrics in wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2007,14(2):64-68. 被引量:1
-
3程宏兵,费国臻.基于身份的无线传感器网络密钥系统[J].计算机科学,2007,34(10):116-119. 被引量:4
-
4付小晶,张国印,马春光.异构传感器网络基于身份的认证及密钥协商方案[J].武汉大学学报(信息科学版),2010,35(5):582-586. 被引量:1
-
5付小晶,张国印,马春光.无线传感器网络基于身份的密钥建立协议综述[J].计算机科学,2010,37(8):26-31. 被引量:1
-
6曾萍,张历,胡荣磊,杨亚涛,刘培鹤.WSN中基于ECC的轻量级认证密钥协商协议[J].计算机工程与应用,2014,50(2):65-69. 被引量:9
-
7郭萍,傅德胜,成亚萍,展翔.一种无线传感器网络双向认证协议设计及证明[J].计算机科学,2015,42(2):100-102. 被引量:1
-
8胡志华,刘小俊.物联网中基于非线性对的漫游认证协议研究[J].四川大学学报(工程科学版),2016,48(1):85-90. 被引量:2
二级引证文献23
-
1陈丹伟,侯楠,孙国梓.一种基于IBE的WSNs选择转发攻击检测方案[J].计算机科学,2010,37(5):53-56. 被引量:1
-
2秦宁宁,蒋敏峰,熊伟丽,徐保国.传感器网络中节点感应模型与相关工作的比较[J].计算机应用研究,2010,27(9):3480-3483. 被引量:3
-
3郭江鸿,李兴华,武坚强.一个新的基于身份的无线传感器网络密钥协商方案[J].计算机科学,2011,38(3):127-130. 被引量:5
-
4张琳,王汝传,王海艳.基于多影响因素的网格信任传播算法[J].通信学报,2011,32(7):161-168. 被引量:7
-
5张琳,姜民明,王汝传,王海艳.一种基于深度优先的开放网络可信路径搜索方法[J].成都信息工程学院学报,2011,26(5):538-543. 被引量:1
-
6张琳,刘正邦,王海艳,王汝传.一种支持行为的可用于信息服务的动态信任监控模型[J].南京邮电大学学报(自然科学版),2013,33(1):68-73. 被引量:2
-
7曾萍,张历,杨亚涛,刘宇新,储旭.WSN中一种轻量级和高安全性的密钥管理方案[J].计算机应用研究,2014,31(1):199-202. 被引量:3
-
8袁艳祥,游林.基于身份加密的可认证密钥协商协议[J].信息网络安全,2014(3):1-6. 被引量:11
-
9杨清华,汪烈军,刘琦.WSNs中基于秘密共享的身份认证协议[J].激光杂志,2014,35(5):39-41. 被引量:4
-
10周彦伟,杨波,王鑫.基于模糊身份的直接匿名漫游认证协议[J].软件学报,2018,29(12):3820-3836.
-
1YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
-
2JIA Xiao-yun,LUO Shou-shan,CHEN Ping,YUAN Chao-wei.Publicly Verifiable Encryption Scheme for RSA[J].通讯和计算机(中英文版),2007,4(1):23-26.
-
3网络媒体:要技术更要有艺术[J].中国广播电视学刊,2001(8):42-42.
-
4刘胜利,郭宝安,张庆胜.An Identity-Based Encryption Scheme with Compact Ciphertexts[J].Journal of Shanghai Jiaotong university(Science),2009,14(1):86-89.
-
5亚洲第一艘半定制CNB抵达日本[J].游艇,2010(3):150-150.
-
6张国艳,王小云.Certificateless Encryption Scheme Secure in Standard Model[J].Tsinghua Science and Technology,2009,14(4):452-459. 被引量:2
-
7陈韬,郁滨.GF(2^n)域上基于ONB的ECC运算单元设计与实现[J].计算机工程,2007,33(9):168-170. 被引量:1
-
8ZOU Xiubin,XIANG Jinhai.Dynamic Broadcast Encryption Scheme with Revoking User[J].Wuhan University Journal of Natural Sciences,2013,18(6):499-503. 被引量:2
-
9CAO Weiwei HU Lei.Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure[J].Chinese Journal of Electronics,2011,20(3):511-515.
-
10叶德辉.消费类电子产品外观的识别性研究[J].中国商贸,2011,0(05X):246-247.