期刊文献+

一种适用于智慧养老的密钥管理机制

An Key Management Mechanism for Smart Service for the Aged
下载PDF
导出
摘要 针对智慧养老的物联网系统安全性问题,提出一个密钥管理方案,系统初始化及组密钥分发采用基于身份的加密机制,新成员加入时的组密钥更新采用对称加密机制。分析表明方案具有较好的安全性,系统开销方面,在计算开销可接受的基础上,有效降低了节点的存储开销和组密钥更新时的通信开销。同时方案具有较好的可扩展性,适用于资源受限的智慧养老的物联网系统。 For the security of IOT system of smart service for the aged,a key management scheme is proposed. The identity-based encryption mechanism is used in process of system initialization and group key distribution,and a symmetric encryption mechanism is used for rekeying group key when a new member joins. The analysis shows that the scheme is in good security. In terms of system overhead,on the basis of acceptable computational overhead,the storage overhead of the node and the communication overhead of rekeying the group key are effectively reduced. At the same time,the scheme has good scalability and thus it is suitable for resource-limited IOT systems of smart service for the aged.
作者 赵欢欢 ZHAO Huan-huan(School of Computer and Information Engineering,Chuzhou University,Chuzhou 23900,China)
出处 《榆林学院学报》 2019年第2期98-101,共4页 Journal of Yulin University
基金 安徽省高校自然科学研究项目(KJ2017B16) 滁州学院规划项目(2015GH22)
关键词 密钥管理 密钥更新 智慧养老 基于身份的加密 key management rekeying smart service for the aged identity-based encryption
  • 相关文献

参考文献4

二级参考文献32

  • 1沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 2曾玮妮,林亚平,胡玉鹏,易叶青,李小龙.传感器网络中一种基于分布式更新权限的组密钥管理方案[J].计算机研究与发展,2007,44(4):606-614. 被引量:11
  • 3杨庚,余晓捷,王江涛,程宏兵.基于IBE算法的无线传感器网络加密方法研究[J].南京邮电大学学报(自然科学版),2007,27(4):1-7. 被引量:8
  • 4Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach [C] //Proceedings of IEEE Infocom'05, New York, 2005, 503-514.
  • 5Zhu S, Setia S, Xu S, et al. GKMPAN: An efficient group rekeying scheme for secure multicast in Ad-hoc networks [C] //Proc of the First Annual International Conferenee on Mobile and Ubiquitous Systems: Network- ing and Services, Oakland: IEEE Computer Society, 2006: 301-325.
  • 6Eltoweissy M, Moharrum M, Mukkamala R. Dynamic key management in sensor networks [J].IEEE Communications Mazine, 2006, 44 (4), 122- 130.
  • 7D Boneh, M Franklin. Identity-based Eneryption from the Weil Pairing [C] //Advances in Cryptology - CRYPTO 2001, Berlin: Springer-Verlag, 2001: 213-229.
  • 8Yu Ng Ching , Y Mu, W Susifo, An identity-based broadcast encryption scheme for mobile ad hoe networks [J]. communications and information technology, 2006, 1 : 24-29.
  • 9Gura N, Patel L A, Wander A, et al. Comparing elliptic curve cryptography and RSA on 8 bit CPUs [C]// Proceedings of the Workshop on Cryptography Hardware and Embedded Systems (CHES2004), Boston; Computer Science, 2004; 119-132.
  • 10I.auter K. The advantages of elliptic curve cryptography for wireless security [J]. IEEE Wireless Communications, 2004, 11 (1): 62-67.

共引文献262

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部