首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份加密的无线传感器网络密钥分配方法
引用本文:杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184.
作者姓名:杨庚  王江涛  程宏兵  容淳铭
作者单位:1. 南京邮电大学数理学院,江苏南京 210003;2. 南京邮电大学计算机学院,江苏南京 210003;3. Department of Electrical and Computer Engineering,University of Stavanger,N-4036,Norway
基金项目:江苏省自然科学基金,江苏省教育厅青蓝工程项目,南京邮电大学校科研和教改项目,江苏省六大人才高峰基金
摘    要:由于无线传感器网络在电源、计算能力和内存容量等方面的局限性,传统的网络密钥分配和管理方法已不适用.本文从基于身份密钥体系出发,提出了一种适用于无线传感器网络的密钥预分配方法.首先简要介绍了身份密钥体系,特别是Boneh-Franklin算法,然后基于身份密钥系统和Diffie-Hellman算法,给出我们的密钥分配方法,并从方法的复杂性、安全性、健壮性和内存需求等方面,与随机算法等进行了分析比较,结果表明我们的算法在这些方面有一定的优势.最后我们讨论了可进一步研究的内容.

关 键 词:基于身份标识密钥系统  网络安全  Diffie-Hellman算法  无线传感器网络  
文章编号:0372-2112(2007)01-0180-05
收稿时间:2005-12-14
修稿时间:2005-12-142006-06-20

A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms
YANG Geng,WANG Jiang-tao,CHENG Hong-bing,RONG Chun-ming.A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms[J].Acta Electronica Sinica,2007,35(1):180-184.
Authors:YANG Geng  WANG Jiang-tao  CHENG Hong-bing  RONG Chun-ming
Affiliation:1. College of Mathematics & Physics,Nanjing University of Posts & Telecommunications,Nanjing,Jiangsu 210003,China;2. College of Computer,Nanjing University of Posts & Telecommunications,Nanjing,Jiangsu 210003,China;3. Department of Electrical and Computer Engineering,University of Stavanger,N-4036,Norway
Abstract:It is an important challenge to find out a suitable key establishment scheme for wireless sensor networks due to limitations of power, computation capability and storage resources. Many schemes based on random predistrubution technique and public key cryptography are investigated. Recently, a practical identity-based encryption technique is proposed. This paper presents an identity-based key establishment scheme for key predistribution and exchange in wireless sensor networks. It reviews first the identity-based encryption, particularly, the Boneh-Franklin algorithms. It describes a novel key establishment scheme based on the basic Boneh-Franklin and Diffie-Hellman algorithms. It discusses the efficiency and security of our scheme by comparing with random key assignment technique and symmetric key technique.
Keywords:identity-based cryptography  network security  Diffie-Hellman key exchange  wireless sensor network
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号