期刊文献+

移动对等传感器网络的基于属性加密的组密钥管理协议 被引量:1

A group key management protocol using attribute-based encryption for mobile peer-to-peer wireless sensor networks
下载PDF
导出
摘要 提出了一个具有较小解密代价的密文策略属性基加密(CP-ABE)方案,并在标准模型下证明了其安全性。进而提出一个适用于移动对等传感器网络(MP2PWSN)的基于CP-ABE的组密钥管理协议。在该协议下,移动节点和簇头节点首先完成簇间组密钥分发,然后由簇头进行簇内组密钥分发。该协议满足后向安全性,支持节点动态加入,退出以及节点撤销,还能实现细粒度的传感器数据访问控制和隐私保护。仿真结果表明,该协议由于采用低解密代价的CP-ABE算法,传感器节点的能耗不随属性数量的增多而显著增加,因此能够较好地满足MP2PWSN的匿名组通信安全需求。 A new ciphertext-policy attribute-based encryption (CP-ABE) scheme with lower decryption cost was presen- ted, and it was proved secure in a stand model. Then a group key management protocol based on CP-ABE was pro- posed for mobile peer-to-peer wireless sensor networks (MP2PWSN). Under this protocol, mobile nodes and clus- ter heads firstly complete the inter-cluster group key distribution, and then a cluster head distributes the group key within its cluster. This protocol satisfies the backward security, permits node dynamically joining, leaving and be- ing revoked, and also implements the control of fine-grained sensor data access and privacy preserving. The simula- tion results show that sensors' energy consumption does not greatly increase with the number of attributes because the protocol uses a CP-ABE algorithm with lower decryption cost. Therefore, this protocol can meet the security re- quirements of anonymous group communication for MP2PWSN.
出处 《高技术通讯》 CAS CSCD 北大核心 2013年第2期109-115,共7页 Chinese High Technology Letters
基金 国家自然科学基金(61073042 61170241) 中央高校基本科研业务费专项资金(HEUCF100606) 网络与数据安全四川省重点实验室开放课题资金(201107) 黑龙江省教育厅科学技术研究项目资金(12523049)资助项目
关键词 移动对等传感器网络(MP2PWSN) 组密钥 属性基加密(ABE) 标准模型 匿名通信 mobile peer-to-peer wireless sensor network ( MP2PWSN), group key, attribute-based encryp-tion (ABE) , standard model, anonymous communieation
  • 相关文献

参考文献13

  • 1Piotrowski K, Langendoerfer P, Peter S. How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, USA, 2006. 169- 176.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy at- tribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, USA, 2007. 321-334.
  • 3Ali M, Langendoen K. A case for peer-to-peer network overlays in sensor networks. In : Proceedings of Workshop on Wireless Sensor Network Architecture, Cambridge, Massachusetts, USA, 2007.55-60.
  • 4Rondini E, Hailes S, Li L. Load sharing and bandwidth control in mobile P2P wireless sensor networks. In: Pro- ceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, China,2008. 468473.
  • 5AntaoS, Bajard J, Sousa L. RNS-Based elliptic curve point multiplication for massive parallel architectures. The Computer Journal, 2011 : 1-19.
  • 6Fang H W, Ko L C, Fang H Y. A design ofservice-based P2P mobile sensor networks. In : Proceedings of the IEEE International Conference on Sensor Networks, Ubiqui- tous, and Trustworthy Computing, Taichung, Taiwan, China, 2006. 152-157.
  • 7Sumino H, Ishikawa N, Kato T. Design and implementa- tion of P2P protocol for mobile phones. In: Proceedings of the 4th Annual IEEE International conference on Per- vasive Computing and Communications Workshops, Pisa, Italy, 2006. 1-6.
  • 8Xiong X, Wong D S, Deng X. TinyPairing: computing tate pairing on sensor nodes with higher speed and less memory. In: Proceedings of the 8th IEEE International Symposium on Network Computing and Applications, Cambridge, USA, 2009. 187-194.
  • 9Cheung L, Cooley J A, Khazan R, et al. Collusion-resist- ant group key management using attribute-based encryp- tion. Cryptology ePrint Archive, Report 2007/161, 2007.
  • 10Gura N, Patel A, Wander A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceed- ings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, USA, 2004. 119-132.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部