期刊文献+

基于PKC的WSN安全结构

A PKC-BASED SECURITY ARCHITECTURE FOR WSN
下载PDF
导出
摘要 由于传感器节点能量、计算和存储资源的限制,发现适用于无线传感器网络的加密技术是一个重要的挑战。考虑到传感器节点资源受限的特点,一种基于公钥加密的安全结构被提出。该安全结构以基于身份的密码系统为基础,但不需要密钥握手。分析表明该安全结构不但有好的安全强度,而且非常适用于资源受限的无线传感器网络。 It is an important challenge to find out the cryptography suitable for wireless sensor networks,for there is the limitation in sensor nodes with regard to energy,computation and storage resources.Considering the characteristic of resources-constrained sensor nodes,a security architecture based on public key cryptography is proposed.The security architecture is on the basis of identity-based cryptosystem,but doesn't require key handshaking.Analysis shows that the security architecture ensures a good level of security and is very suitable for resources-constrained wireless sensor network.
作者 姚剑波
出处 《计算机应用与软件》 CSCD 2011年第1期130-132,共3页 Computer Applications and Software
基金 贵州省教育厅自然科学研究项目(黔教科2008064) 贵州省优秀科技教育人才省长专项资金项目(黔省专合字(2009)27号)
关键词 无线传感器网络 安全结构 公钥加密 基于身份的密码系统 Wireless sensor network Security architecture Public key cryptography Identity-based cryptosystem
  • 相关文献

参考文献13

  • 1Wander A S, Gura N, Eberle H, et al. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks [ C ]//proceedings of Per- Com,2005:324 - 328.
  • 2Jing Q,Hu J,Chen Z. C4W:An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks [ C ]//IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS) ,Oct. 2006: 827 - 832.
  • 3Mo. kammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong, et al. An asymmetric key-based security architecture for wireless sensor networks[ J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,2008,2(5 ) :265 -279.
  • 4Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks [ C ]//Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November, 2002 : 18 - 22,41 - 47.
  • 5Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks [ C-//IEEE Symposium on Security and Privacy, Berkeley, California, May 2003 : 11 - 14,197 - 213.
  • 6Du W,Deng J, Han Y S, et al. A pairwise key predistribution scheme for wireless sensor networks [ C ]//Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 2003:27 - 31,42 - 51.
  • 7Liu D, Ning P. Establishing pairwise keys in distributed sensor networks [ C ]//Proceedings of the 10th ACM Conference on Computer and Communications Security ( CCS ), Washington, DC, USA, October 2003:27 -31,52 -61.
  • 8Du W, Wang R, Ning P. An efficient scheme for authenticating public keys in sensor networks [ C ]//MobiHoc' 05, May 25 - 27,58 - 67, UrbanaChampaign, Illinois, USA, 2005.
  • 9Gaubatz G, Kaps J, Sunar B. Public keys cryptography in sensor networks revisited [ C ]//The Proceedings of the 1 st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS) ,2004.
  • 10Gura N, Patel A, Wander A, et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs [ C l//Proceedings of the Workshop on Cryptography Hardware and Embedded Systems ( CHES 2004 ) , Boston, August,2004 : 11 - 13.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部