期刊文献+

TinyIBE:面向无线传感器网络的身份公钥加密系统 被引量:7

TinyIBE:An Identity-Based Encryption System for Wireless Sensor Network
下载PDF
导出
摘要 由于无线传感器网络节点的资源受限,大部分公钥加密算法被认为无法适用。最近的研究则显示椭圆曲线加密算法ECC(Elliptic Curve Cryptography)在无线传感器节点上运算可行,基于身份的公钥密码体制IBE也因此成为研究热点,但尚无出现完整的解决方案。在分析面向TinyOS的公钥算法相关研究工作基础上,设计实现了一套基于Tate对的身份公钥加密系统TinyIBE。首先给出椭圆曲线选择及Tate对参数优化过程,再设计在线和离线PKG两种应用方案,最后在MICA2节点上给出测试结果。 Due to the node resource limit for wireless sensor networks (WSN), the public key algorithms are generally considered not suitable. However, more recent research shows that implementation of Elliptic Curve Cryptography on sensor nodes is acceptable. Therefore, Identity-based Encryption study on WSN is very hot recently, but till now there are no full solutions proposed. The state-of-the-art research on public key techniques on TinyOS is reviewed, and a Tate Pairing-based encryption system, TinylBE, is proposed. The optimization process for elliptic curves and pairing parameters selection is first described, then two encryption application schemes, namely with online or offline PKG, are designed, and finally our solution is implemented and tested on the MICA2 node.
出处 《传感技术学报》 CAS CSCD 北大核心 2009年第8期1193-1197,共5页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目资助(60773115) 国家863计划项目资助(2006AA10Z235)
关键词 无线传感器网络 身份公钥加密 椭圆曲线 双线性对 TINYOS wireless sensor network identity-based encryption elliptic curve bilinear pairing TinyOS
  • 相关文献

参考文献16

  • 1Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks [J]. Wireless Networks, 2002, 8(5):521-534.
  • 2Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks [C]// 2nd ACM SensSys, 2004,162-175.
  • 3Gura N , Patel A , Wander A , et al. Comparing Elliptic Curve Cryptography and R SA on 8-bit CPUs[C]//Workshop on Cryptographic Hardware and Embedded Systems, 2004, 119-132.
  • 4Malan D J, Welsh M, and Smith M Do A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//IEEE International Conference on Sensor and Ad Hoe Communications and Networks, Santa Clara, California, 2004,71-80.
  • 5Zhang Y, Liu W, Lou W, and Fang Y. Securing Sensor Networks with Location-Based Keys[C]// IEEE Wireless Communications and Networking Conference. 2005, 1909-1914.
  • 6Doyle B, Bell S, Smeaton A F, McCusker K, et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks [J]. The Computer Journal, 2006, 49(4): 443-453.
  • 7McCusker K, Connor N, and Diamond D. Low-Energy Finite Field Arithmetic Primitives for Implementing Security in Wireless Sensor Networks[J]. Communication, Circuits And Systems Proceedings, 2006,1537-1541.
  • 8Oliveira L B, Dahab R, Lopez J, et al. Identity-Encryption for Sensor Networks[C]// 3rd IEEE PerCom Workshop on Pervasive Wireless Networking, March 2007,876-884.
  • 9庞辽军,李慧贤,焦李成,王育民.基于秘密共享的无线传感器网络广播密钥分发协议[J].传感技术学报,2008,21(10):1775-1779. 被引量:4
  • 10Watro R, Kong D, at al. TinyPK..Securing Sensor Networks with Public Key Technology[C]//SASN' 04 (ACM), Washington DC, 2004, 322-339.

二级参考文献15

  • 1覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 2覃伯平,周贤伟,杨军,李晓勤.基于无线传感器网络路由协议的安全机制研究[J].传感技术学报,2006,19(4):1276-1278. 被引量:15
  • 3沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 4Stephan O, Qingwen xu. Information Assurance in Wireless Sensor Networks[C]// Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS05, 2005.
  • 5IEEE P802. lli, Draft Supplement to STANDARD FOR Telecommunications and Information Exchange Between Systems -LAN/ MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Operation in Additional Regulatory Domains[S].
  • 6GB15629.112003/XG1-2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单》[S].中国标准出版社,2006年.
  • 7IEEE 802. 16e-2005. IEEE Standard for Local and metropolitan for Fixed Broadband Wireless Access Systems: Amendment 2 : Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands[S].
  • 8庞辽军,黄振海,郭宏等.一种增强无线城域网安全性的方法[P].专利号:ZL200410073156.9,授权公告日:2006年6月.
  • 9Perrig A. et al. SPINS: Security Protocols for Sensor Networks[J].Wireless Networks Journal (WINE), September 2002 8(5) : 521-534.
  • 10Liu D, Ning P. Multi-Level μTESLA: A Broadcast Authentication System for Distributed Sensor Networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3(4): 800-836.

共引文献3

同被引文献58

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2张瀚,王秀峰,李朝晖,刘大海.基于时空混沌系统的单向Hash函数构造[J].物理学报,2005,54(9):4006-4011. 被引量:33
  • 3Zhang J,Varadharajan V. Wireless Sensor Network Key Management Survey and Taxonomy [ J ]. Journal of Network and Computer Applications ,2010,33 (2) :63-75.
  • 4Watro R, Kong D. TinyPK : Securing Sensor Networks with Public Key Technology [ C ]//SASN'04. Washington, DC, USA, ACM, 2004 : 122-133.
  • 5David J, Matt W, Smith D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[ C ]// IEEE International Conference on Sensor and Ad Hoc Communications and Networks(SECON04). Piscataway IEEE ,2004 :289-302.
  • 6Wang H,Sheng B, Li Q. Elliptic Curve Cryptography Based Access Control in Sensor Networks [ J ]. International Journal of Security and Networks ,2007,1 ( 3/4 ) : 127-137.
  • 7Wang H, Li Q. Efficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes [ R ]. Technical Report, WM-CS-2006-7, Dept. of Comp. and Info. Sci. ,Cleveland State University.
  • 8Liu A, Kampanakis P, Ning P. TinyECC: Elliptic Curve Cryptography for Sensor Networks ( Version 0. 3 ) [ R]. http:// discovery, csc. ncsu. edu/software/TinyECC/, February 2007.
  • 9Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing[ C ]//Crypto' 2001. LNCS2139, Springer- Verlag, 2001 : 213-229.
  • 10Hoeper K,Gong G. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation [ R ]. Technical Report CACR 2006-04, Centre for Applied Cryptographic Research, Waterloo, Canada ,January 2006.

引证文献7

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部