期刊文献+

带认证的ZigBee密钥分配方案 被引量:2

A Key Distribution Scheme with Authentication for ZigBee
下载PDF
导出
摘要 针对ZigBee节点组网时缺乏身份认证,密钥分配安全性不足的问题,该文提出一种基于身份的无双线性对运算的ZigBee节点身份认证及密钥分配方案。该方案继承了基于身份的认证方案的优点,在实现身份认证的同时完成了ZigBee密钥分配过程,具有较高的安全性和可扩展性。实验结果表明,该文方案具有存储开销小、能耗低等优势。 ZigBee nodes are deficient in identity authentication and key distribution security, for purpose ot solving those issues, an identity-based ZigBee identity authentication and key distribution scheme without weil pairing is proposed. This scheme bears the strongpoint of identity-based authentication scheme. The completion of ZigBee key distribution can be simultaneous with identity authentication implementation with high security and extensibility. Experiments show that the proposed scheme has the advantage of limited storage cost, low energy consumption etc..
作者 郁滨 杨同豪
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第9期2277-2281,共5页 Journal of Electronics & Information Technology
关键词 身份认证 密钥分配 ZIGBEE 基于身份 Identity authentication Key distribution ZigBee Identity-based
  • 相关文献

参考文献14

  • 1ZigBee Alliance. ZigBee specifications[EB/OL], http://www. zigbee.org, 2008.
  • 2ZigBee Alliance. ZigBee security specification overview[EB/ OL]. http://www.zigbee.org, 2010.
  • 3Ytlksel E, Nielson H R, and Nielson F. ZigBee-2007 security essentials[C]. Proceedings of the 13th Nordic Workshop on Secure IT Systems, Copenhagen, 2008: 65-82.
  • 4Lee Kyung hwa, Lee Jooh yun, Zhang Bong duk, et al.. An enhanced trust center based authentication in ZigBee networks[C]. Advances in Information Security and Assurance, Lecture Notes in Computer Science, Seoul, 2009, 5576: 471-484.
  • 5Yflksel E, Nielson H R, and Nielson F. A secure key establishment protocol for ZigBee wireless sensor networks[J]. Computer Journal, 2011, 54(4): 589-601.
  • 6Blaser M. Industrial-strength security for ZigBee: the case forpublic-key cryptography[J]. Embedded Computing Design, 2005, 3(3): 48-52.
  • 7Oliveira L B, Dahab R, Lopez J, et al.. Identity-based encryption for sensor networks[C]. Proceedings of the 5th Annual IEEE International Conference on PerCom Workshops, New York, 2007: 290-294.
  • 8Shamir A. Identity-based cryptography and signature schemes[C]. Advances in Cryptology, Lecture Notes in Computer Science, California, 1984, 196: 47-53.
  • 9刘文琦,顾宏,杨建华.基于身份的同时生效签密体制研究[J].电子与信息学报,2011,33(7):1582-1588. 被引量:2
  • 10SUN Zhongwei,WU Juying.Identity-based Access Control for Distribution Automation Using EPON[J].Chinese Journal of Electronics,2011,20(3):443-446. 被引量:3

二级参考文献15

  • 1Yu Yong, Yang Bo, Sun Ying, and Zhu Sheng-lin. Identity based signcryption scheme without random oracles [J]. Computer Standards & Interfaces, 2009, 31(1): 56-62.
  • 2Zhang J and Geng Q. Cryptoanalysis of two signcryption schemes [C1. Fifth International Conference on Information Assurance and Security, Xi'an, China, Aug. 18-20, 2009: 65-68.
  • 3Hur Jun-beom, Park Cha-nil, and Yoon Hyun-soo. Chosen ciphertext secure authenticated group communication using identity-based signcryption [J]. Computers and Mathematics with Applications, 2010, 60(2): 362-375.
  • 4Chen L, Kudla C, and Paterson K G. Concurrent signatures [C]. Advances in Cryptology-EUROCRYPT 2004, Interlaken, Switzerland, May 2004, LNCS 3027: 287-305.
  • 5Susilo W, Mu Y, and Zhaag F. Perfect concurrent signature schemes [C]. Information and communications security- ICICS 2004, Malaga, Spain, Oct. 2004, LNCS 3269: 14-26.
  • 6Wang G, Bao F, and Zhou J. The fairness of perfect concttrrent signatures [C]. Information and Communications Security - ICICS2006, Raleigh, USA, Dec. 2006, LNCS 4307: 435-451.
  • 7Chow S and Susilo W. Generic construction of (identity- based) perfect concurrent signatures [C]. International Conference on Information and Communications Security 2005, Beijing, China, Dec. 10-13, 2005, LNCS 3783: 194-206.
  • 8Huang Z, Chen K, and Lin X, et al,. Analysis and improvements of two identity-based perfect Concurrent signature schemes[J]. Informatica, 2007, 18(3): 375-394.
  • 9Huang X and Wang L. A fair concurrent signature scheme based on identity [C]. High Performance Computing and Applieations-HPCA2009, Shanghai, China, Aug. 2009: 198-205.
  • 10Zhang J and Gao S. Efficient strong fair concurrent signature scheme [C]. International Conference on E-Business and E-Government, Guangzhou, China, May 2010: 1327-1330.

共引文献3

同被引文献19

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部