Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2007-01
Add to Favorite Get Latest Update

A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms

YANG Geng(1,2),WANG Jiang-tao2,CHENG Hong-bing2,RONG Chun-ming3(1.College of Mathematics & Physics,Nanjing University of Posts & Telecommunications,Nanjing,Jiangsu 210003,China;2.College of Computer,Nanjing University of Posts & Telecommunications,Nanjing,Jiangsu 210003,China;3.Department of Electrical and Computer Engineering,University of Stavanger,N-4036,Norway)  
It is an important challenge to find out a suitable key establishment scheme for wireless sensor networks due to limitations of power,computation capability and storage resources.Many schemes based on random predistrubution technique and public key cryptography are investigated.Recently,a practical identity-based encryption technique is proposed.This paper presents an identity-based key establishment scheme for key predistribution and exchange in wireless sensor networks.It reviews first the identity-based encryption,particularly,the Boneh-Franklin algorithms.It describes a novel key establishment scheme based on the basic Boneh-Franklin and Diffie-Hellman algorithms.It discusses the efficiency and security of our scheme by comparing with random key assignment technique and symmetric key technique.
【Fund】: 江苏省自然科学基金重点预研项目(No.BK2004218);; 江苏省“青蓝工程”基金(No.KZ0040704006);; 南京邮电大学“攀登计划”基金(No.05KJD520144);; 江苏省“六大人才高峰”基金(No.06-E-044)
【CateGory Index】: TP212.9;TN918.6
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 YANG Li-juan,HUANG Dao-chang,LI Yuan-ping(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Research on key management in Wireless Sensor Network[J];Journal of Changsha Communications University;2008-01
2 ZHANG Shu-kui1,2,CUI Zhi-ming1,2,GONG Sheng-rong1,2,SUN Yong1,2 (1.School of Computer Science and Technology,Soochow University,Suzhou,Jiangsu 215006,China;2.Jiangsu Key Laboratory of Computer Information Processing Technology,Soochow University,Suzhou,Jiangsu 215006,China);An Investigation on Local Area Control of Compromised Nodes Spreading in Wireless Sensor Networks[J];Acta Electronica Sinica;2009-04
3 Zhang Rui Liu Ji-qiang Zhao Jia (Research Center of Information Security Architecture, Beijing Jiaotong University, Beijing 100044, China);An ID-based Key Pre-distribution Scheme for Wireless Sensor Networks[J];Journal of Electronics & Information Technology;2009-04
4 BIAN Yi-ming,YANG Geng(College of Computer,Nanjing University of Posts and Telecommunications,Nanjing Jiangsu 210003,China);Research on Access Control Method Based on ABE Algorithm[J];Guangxi Communication Technology;2009-04
5 CUI Guo-hua1 ZHANG Li-ping1,2 YU Zhi-gang3 XU Peng1 CHEN Jing1(College of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China)1(College of Computer Science and Technology,China University of Geosciences,Wuhan 430074,China)2(State Key Laboratory for New Optical Communication Technologies and Networks,Wuhan Research Institute of Posts&Telecommunication,Wuhan 430074,China)3;Key Predistribution Scheme for Wireless Sensor Networks Based on Hierarchical Grid[J];Computer Science;2008-11
6 LI Ming-xiang,ZHENG Xue-feng,YAN Peng(School of Information Engineering,University of Science & Technology Beijing,Beijing 100083,China);Survey of research on identity-based encryption[J];Application Research of Computers;2008-12
7 ZHANG Li-ping1,YU Zhi-gang2(1.College of Computer Science & Technology,China University of Geosciences,Wuhan 430074,China;2.State Key Laboratory for New Optical Communication Technologies & Networks,Hongxin Telecommunication Tachnologies Co.,LTD,Wuhan Research Institute of Posts & Telecommunication,Wuhan 430074,China);Key predistribution scheme using Hamming distance for WSN[J];Application Research of Computers;2009-05
8 WANG Li-qin1,YANG Xiao-yuan1,2,LI Mao-tang1(1.Key Laboratory of Network & Information Security of APF,Engineering College of APF,Xi'an 710086,China;2.Key Laboratory of Network & Information Security of Ministry of Education,Xidian University,Xi'an 710071,China);Pairings-based key management and authentication scheme for WSN[J];Application Research of Computers;2009-11
9 QI Zheng-hua,YANG Geng,CHEN Wei,WANG Hui College of Computer,Nanjing University of Posts and Teclecommunications,Nanjing 210046,China;ITBES:One Threshold and Identity Based Encryption-signature Scheme for WSN[J];Journal of Nanjing University of Posts and Telecommunications(Natural Science);2009-05
10 YU Chang-guo,YANG Geng,LI Da-wei(College of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China);A(t,n) Threshold Adjustment Scheme Based on IBE[J];Computer Technology and Development;2009-11
China Proceedings of conference Full-text Database 1 Hits
1 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
2 JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China);Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
3 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
4 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
5 PANG Liao-jun1,2,LI Hui-xian3,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2.Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;3.School of Comput.Sci.,Northwestern Polytechnical Univ,Xi'an 710072,China;Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing[J];Chinese Journal of Sensors and Actuators;2008-10
6 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
7 YANG Guang-song1,CHEN Chao-yang1,XIAO Ming-bo2(1.School of Information Engineering,Jimei University,Xiamen 361021,China;2.Department of Communication Engineering,Xiamen University,Xiamen 361005,China);Design of cross-layer security for wireless sensor network's[J];Transducer and Microsystem Technologies;2007-02
8 ZHOU Quan1,ZHOU Xiao-dong2(1.Institute of Information Security,Guangzhou University,Guangzhou 510006,China;2.West Sichuan Drilling Corp,Chengdu 610011,China);Trusted routing protocol based on cluster head for wireless sensor networks[J];Transducer and Microsystem Technologies;2008-10
9 YANG Li-juan,HUANG Dao-chang,LI Yuan-ping(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Research on key management in Wireless Sensor Network[J];Journal of Changsha Communications University;2008-01
10 WANG Gang1,WEN Tao1,2,GUO Quan2,MA Xue-bin1(1.Software Center,Northeastern University,Shenyang 110004,China;2.Department of Computer Science and Technology,Neusoft Information Institute,Dalian 116023,China.);A Cluster-Based Security Protocol in Wireless Sensor Networks[J];Journal of Northeastern University(Natural Science);2009-01
China Proceedings of conference Full-text Database 6 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
3 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
4 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
5 Wang Jianqiu1,2 Lang Weimin3 Ji Yinghua1 (1 College of Physics and Communication Electronics, Jiangxi Normal University, Nanchang, 330027, China; 2 College of Electronic and Information Engineering,Wuhan Institute of Technology, Wuhan, 430074, China; 3 PLA Communication Commands Academy, Wuhan, 430010, China);Research on the Security in Wireless Sensor Network[A];[C];2008
6 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Sheng~1,XU Guo-ai~1,HU Zheng-ming~1,YANG Yi-xian~1,ZHOU Xi-zeng~2(1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2. Yuanze University of Taiwan, Taiwan 000320, China);A Mobile IP Authentication Protocol Based on Identity[J];Journal of Beijing University of Posts and Telecommunications;2005-03
2 QIN Bo-ping, ZHOU Xian-wei, YANG Jun, SONG Cun-yi (School of Information Engineering, University of Science & Technology Beijing, Beijing 100083, China);Research on Secure Routing Techniques in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2006-01
3 LI Xiang~1, YAN Xin-fang~ 1, 2 ,SUN Yu-geng~1,YANG Ting~1 1.School of Electrical Engineering & Automation, Tianjin University,Tianjin 300072,China; 2.College of Information Engineering, Zhengzhou University,Zhengzhou 450052,CHina;Energy-Aware Hierarchical Clustering Algorithm for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2006-04
4 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
5 PANG Liao-jun1,2,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2 Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;Authentication and Key Negotiation Protocol Between Two Nodes of Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-08
6 WANG Jia-hao QIN Zhi-guang LAN Tian ZHAO Yang (School of Computer Science and Engineering,Univ.of Electron.Sci.& Tech.of China Chengdu 610054);An Improved Random Key Predistribution Scheme in Wireless Sensor Network[J];Journal of University of Electronic Science and Technology of China;2006-S1
7 ZOU Juan1,JIA Shi-jie1,ZENG Jie1,LI Hui2(1.School of Electric & Information,Dalian Jiaotong University,Dalian 116028,China;2.Ministry of Education Key Lab.of Computer Network and Information Security,Xidian University,Xi'an 710071,China);Study of Key Distribution and Management for Wireless Ad-Hoc[J];Journal of Dalian Jiaotong University;2007-01
8 YU Xian-tao, ZHANG Chun-yan, MO Yi-min(The Friction Institute of Wuhan University of Technology, Wuhan 430070, China);Application of wireless sensors network for monitoring indoor environment[J];Electric Drive Automation;2006-02
9 Cao Qiguo; Sun Yugeng(Dept.of Electrical Engineering and Automation,Tianjin University,Tianjin 300072);The Hypergraph Design Method of Multibus Structures of Reliable Communication Networks[J];Acta Electronica Sinica;1997-10
10 WANG Huan-zhao,LUO Dong-wei,GUO Yu-fei,LI Zeng-zhi(Department of Computer Science and Technology,Xi'an Jiaotong University,Xi'an 710049,China);A Dynamic Keys Management Policy for Mass Wireless Sensor Networks[J];Acta Electronica Sinica;2008-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved