中国邮电高校学报(英文)

• Network • 上一篇    下一篇

An authenticated identity-based key establishment and encryption scheme for wireless sensor networks

程宏兵;杨庚;王江涛;黄晓   

  1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • 收稿日期:2005-11-14 修回日期:1900-01-01 出版日期:2006-11-23
  • 通讯作者: 程宏兵

An authenticated identity-based key establishment and encryption scheme for wireless sensor networks

CHENG Hong-bing;YANG Geng; WANG Jiang-tao;HUANG Xiao   

  1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2005-11-14 Revised:1900-01-01 Online:2006-11-23
  • Contact: CHENG Hong-bing

关键词:

Abstract: Security of wireless sensor networks has received considerable attention. It is a critical challenge to find out suitable encryption schemes for wireless sensor networks due to limitations of power, computation capability and storage resources of these networks. Many encryption schemes based on asymmetric and symmetric have been investigated. In this paper, we present an authenticated identity-based key encryption scheme for wireless sensor networks. We first review briefly about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms, then describe an authenticated identity-based key encryption scheme based on Boneh-Franklin algorithms, and finally show the integrity of our scheme and discuss its efficiency and security by comparing it with other asymmetric and symmetric encryption schemes. 25 Refs. In English.

Key words: identity-based encryption scheme; network security; Boneh-Franklin algorithms; wireless sensor network

中图分类号: