期刊文献+

一种混合轻量型无线传感器网络公钥密码方案 被引量:9

Hybrid and Lightweight Cryptography for Wireless Sensor Network
在线阅读 下载PDF
导出
摘要 将基于身份的公钥机制与轻量级CA(Certificate Authority)思想相结合,构建了一个基于身份及轻量级CA混合模型的传感器网络密码方案。该方案既克服了基于身份公钥机制中的第三方密钥托管问题,又简化了基于传统证书机制中产生、验证及管理公钥的复杂性。分析表明,方案可使公钥产生轻量化,公钥验证轻量化,密钥管理无需证书,且安全性高,可抵御无线环境下易于实施的多种攻击,适用于保障资源受限的无线网络中数据的机密性、完整性和不可否认性。 Combined identity-based system with the idea of lite-CA(Certificate Authority),a scheme of identity-based and lightweight CA-based cryptography for wireless sensor network was proposed.The scheme not only avoids the drawback of private key escrow in the identity-based system,but also gains the advantage of simplifying complication of producing and verifying public key in traditional certificate-based CA system.Analysis shows that the scheme equips with characteristics of lite-producing public key,lite-verifying public key,certificate less,and high security which can defense some attacks easily carrying into wireless environment.It is applicable to be used in wireless network to gain data confidentiality,integrity,and non-refutation.
出处 《计算机科学》 CSCD 北大核心 2012年第1期69-72,81,共5页 Computer Science
基金 国家自然科学基金青年基金(60903027)资助
关键词 无线网络安全 无线传感器网络(WSN) 基于身份 轻量级CA Wireless network security Wireless sensor network(WSN) Identity-based Lite-CA
  • 相关文献

参考文献14

  • 1Malan D J,Welsh M,Smith M D. A public-key infrastructure forkey distribution in TimyOS based on elliptic curve cryptography [A]ffProceedings of the 1st IEEE International Conference on Sensor and Ad hoc Communications and Networks [C]. 2004: 71-80.
  • 2Kohnfelder L M. Towards a practical public key cryptosystem [D]. Boston, MIT Department of Electrical Engineering, 1978.
  • 3Shamir A. Identity-based eryptosystems and signature schemes [A] ff Advances in Cryptology-CRYPTO' 84 [ C]. Springer, 1985:47-53.
  • 4Dang Lan-jun, Kou Wei-dong, Zhang J un, et al. Improvement of mobile IP registration using self-certified public keys[J]. IEEE Transactions on Mobile Computing, 2007 , 1 (4) : 167-173.
  • 5杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 6A1-Riyami S S, Paterson K G. Certificateless public key crypto- graphy[A]//Advances in Cryptology-AsiaCrypt' 03[C]. Sprin- ger, 2003 : 452-473.
  • 7Jiang Yi-lin,Lin Chuang, Shen Xue-min, et al. Mutual authenti- cation and key exchange protocols for roaming services in wire- less mobile networks[J]. IEEE Transactions on Wireless Com- munications, 2006,5(9) : 2569-2577.
  • 8Dong Xiao-lei, Wang Li-heng, Cao Zhen-fu. New public key cryptosystems with lite certification authority[EB/OL], http:// ePrint, iacr. org/2006/154,2006.
  • 9潘耘,王励成,曹珍富,李剑.基于轻量级CA的无线传感器网络密钥预分配方案[J].通信学报,2009,30(3):130-134. 被引量:19
  • 10Dong Xiao-lei, Wei Li-fei, Zhu Hao-jin, et al. EP2DF: An effi- cient privacy-preserving date-forwardin4g scheme for service-orien- ted vehicular Ad Hoc networks[J]. IEEE Transactions on Ve- hicular Technology, 2011,60(2) : 580-591.

二级参考文献30

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2GAUBATZ G, KAPS J, SUNAR B. Public keys cryptography in sensor networks-revisited[A]. Proc of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS)[C]. New York, 2004. 2-18.
  • 3MALAN D J, WELSH M, SMITH M D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[A] Proc of the 1st IEEE Int'l Conf on Sensor and Ad Hoc Communications and Networks[C]. 2004. 71-80.
  • 4HUANG Q, CUKIER J, KOBAYASHI H, et al. Fast authenticated key establishment protocols for self-organizing sensor networks[A]. Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications[C]. San Diego, CA, USA, 2003. 141-150.
  • 5KOTZANIKOLAOU E MAGKOS E, DOULIGERIS C, et al. Hybrid key establishment for multiphase self-organized sensor networks[A]. Proc of the 6th IEEE Int'l Symp on a World of Wireless Mobile and Multimedia Networks [C]. Washington, 2005.581-587.
  • 6RFC 2459[EB/OL]. http://www.ietf.org/rfc/rfc2459.txt.
  • 7AL-RIYAMI S S, PATERSON K G, Certificateless public key cryptography[A]. Advances in Cryptology-AsiaCrypt'03[C]. Springer, 2003.452-473.
  • 8DONG X, WANG L, CAO Z. New public key cryptosystems with lite certification authority[EB/OL], http://ePrint.iacr.org/2006/154.
  • 9KOHNFELDER L M. Towards a Practical Public Key Cryptosystem[D]. MIT Department of Electrical Engineering, 1978.
  • 10SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology-CRYPTO'84[C]. Springer, 1985.47-53.

共引文献74

同被引文献70

  • 1孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3Gnawali O, Jang K Y, Paek J, eta[. The tenet architecture for tiered sensor networks[C]//Proceedings of the 4th ACM Con- ference on Embedded Networked Sensor Systems. Boulder, Co- lorado, USA, 2006 .. 153-166.
  • 4Desnoyers P, Ganesan D, Shenoy P. TSAR.. a two tier sensor storage architecture using inteval skip graphs[C]//Proceedings of the 3rd ACM Conference on Embedded Networked Sensor Systems. San Diego, Calif, USA, 2005 : 39-50.
  • 5Sheng Bo, Li Qun. Verifiable privacy-preserving range query in two-tiered sensor networks[C]~//27tb IEEE International Con- ference on Computer Communications. Phoenix, AZ, USA, 2008 : 46-50.
  • 6Chen Fei, Liu Alex X. SafeQ: secure and efficient query process- ing in sensor networks[C]//29th IEEE International Confer- ence on Computer Communications. San Diego, CA, USA, 2010 : 1-9.
  • 7Shi Jing, Zhang Rui, Zhang Yan-chao. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE Transactions on Wireless Communications, 2011, 10 ( 1 ) : 264-273.
  • 8Yao Yong-lei, Xiong Nai-xue, Park J H, et al. Privacy-preserving max/ min query in two-tiered wireless sensor networks [J]. Computers & Mathematics with Applications, 2013, 65: 1318- 1325.
  • 9Dai Hua,Yang Geng, Qin Xiao-lin. EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks[J]. International Journal of Distribu- ted Sensor Networks,2013(2013).
  • 10Lin Hsiao-ying, Tzeng Wen-guey. An efficient solution to the millionaires' problem based on homomorphic encryption[C]// Proceedings of the 3rd International Conference on Applied Cryptography and Network Security. New York, NY, USA, 2005:97-134.

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部