期刊文献+

无线传感器网络CPKAI密钥管理方案 被引量:1

Research on the CPKAI key Management Scheme of Wireless Sensor Network
下载PDF
导出
摘要 公钥能提供对称密钥无法提供的高安全等级。基于身份的加密技术密钥管理简单、无需第三方参与,但计算复杂度较高,不适用于无线传感网;组合公钥技术存储要求低而认证规模巨大,可在芯片级实现认证,适合无线传感网,但存在合谋攻击问题。基于身份的组合公钥认证方案,将上述技术进行优势整合,采用密钥因子矩阵取代双线性映射生成密钥,有效地降低了加密/解密计算的复杂度,从而节省了网络能耗;密钥因子矩阵基于簇生成,极大地减少了密钥存储空间,并抵御了合谋攻击。从理论上分析了方案的安全性,并通过仿真实验,证明方案在计算复杂度和能效方面具有较大的优势。 Public key can provide the high level of security which symmetric key can not do.Identity-based encryption key management is simple and not third party involved,but its higher computational complexity is not suitable for wireless sensor network;Combined public key technology with low storage requirement and a huge certification size can achieve certification at the chip level and is suitable for wireless sensor network,but there exists the problem of conspiracy attack.This paper presents a combined public key authentication scheme of identity-based,which integrates the advantages of the technology and replaces the bilinear mapping to generate keys with the key factor matrix,thus effectively reducing the encryption/decryption computational complexity and saving the network energy consumption.Key factor matrix based on cluster generation greatly reduces the storage space of the key and resists the conspiracy attack.It also analyses the safety of the scheme from the theory.The simulation proves that the scheme has a larger advantage in the computational complexity and energy efficiency.
作者 归奕红
出处 《河池学院学报》 2012年第2期49-54,共6页 Journal of Hechi University
基金 广西教育厅科研基金资助项目(200708LX260)
关键词 组合公钥 身份 加密 认证 无线传感器网络 combined public key(CPK) identity encryption authentication wireless sensor network(WSN)
  • 相关文献

参考文献7

  • 1R Watro, D Kong, S Cuti,et al. TinyPK: Securing Sensor Networks with Public Key Technology[ C ]//Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks ( SASN' 04 ) , New York, NY, USA,2004,59 - 64.
  • 2D J Malan, M Welsh, M D Smith. A Public -Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks ( SECON' 04), 2004,71 - 80.
  • 3A Shamir. Identity -based Cryptosystems and Signature Schemes[ C ]//G R Blakley, D C Chaum, eds. Advances in Cryptology -Proceedings of CRYPTO' 84. California: Springer - Vdrlag, LNCS, 1985,196,47 - 53.
  • 4N Gura, A Patel, A Wander, et al. Comparing elliptic curve cryptography and rsa on 8 - bit cpus [ C ]//2004 workshop on Cryptographic Hard-ware and Embedded Systems ,2004,119 - 132.
  • 5B Waters. Efficient Identity - Based Encryption Without Random Oracles [ C ]//R. Cramer, eds. Advances in Crytology - EUROCRYPT' 2005, Denmark : Springer - Verlag, LNCS ,2005,3 494,114 - 127.
  • 6YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 7Panlo S L M Barreto, Hae Y Kim, Ben Lynn, etal. Efficient Algorithms for Pairing - Based Cryptosystems [ C ]//M. Yung, eds. California: CRYPTO 2002, Springer - Verlag, LNCS, 2002,2 442:354 - 369.

二级参考文献28

  • 1Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks.Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM,2002:41-47
  • 2Liu D,Ning P.Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks,Proceedings of the 10th Annual Network and Distributed System Security Symposium(NDSS'03),Feb 6-7,2003,San Diego,CA,USA.2003:263-276
  • 3Liu D,Ning P.Multi-level TESLA:Broadcast authentication for distributed sensor networks.ACM Transactions in Embedded Computing Systems(TECS),2004,3(4):800-836
  • 4Di Pietro R,Mancini L V,Mei A.Random key assignment for secure wireless sensor networks.Proceedings of ACM Workshop on Security in Ad Hoc and Sensor Networks(SASN'03),Oct 31,2003.Fairfax.VA,USA.New York,NY,USA:ACM,2003,62-71
  • 5Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.Proceedings of IEEE Symposium on Research in Security and Privacy,May 11-14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213
  • 6Liu D,Ning P.Location-based pairwise key establishments for static sensor networks.Proceedings of ACM Workshop on Security in Ad Hoc and Sensor Networks(SASN'03),Oct 31,2003,Fair fax,VA,USA.New York,NY,USA:ACM,2003,72-82
  • 7Anderson R,Kuhn M.Tamper resistance-A cautionary note.Proceedings of the 2nd USENIX Workshop on Electronic Commerce,Nov 18-21,Oakland,CA,USA.San Dieogo,CA,USA:USENIX Press,1996:1-11
  • 8Blom R.An optimal class of symmetric key generation systems,Lecture Notes in Computer Science,Germany:1985:335-338
  • 9Ganesan P,Venugopalan R,Peddabachagari P,et al.Analyzing and modeling encryption overhead for sensor network nodes.Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications,Sep 19,2003,San Diego,CA,USA.New York,NY,USA:ACM,2003:151-159
  • 10Gura N,Patel A,Wander A,et al.Comparing elliptic curve cryptography and RSA on 8-bit CPUs.Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004),Aug 11-13,2004,Boston,MA,USA.Berlin,Germany:Springer-Verlag,2004:119-132

共引文献9

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部