中国邮电高校学报(英文)
• Network • 上一篇 下一篇
程宏兵;杨庚;王江涛;黄晓
收稿日期:
修回日期:
出版日期:
通讯作者:
CHENG Hong-bing;YANG Geng; WANG Jiang-tao;HUANG Xiao
Received:
Revised:
Online:
Contact:
关键词:
Abstract: Security of wireless sensor networks has received considerable attention. It is a critical challenge to find out suitable encryption schemes for wireless sensor networks due to limitations of power, computation capability and storage resources of these networks. Many encryption schemes based on asymmetric and symmetric have been investigated. In this paper, we present an authenticated identity-based key encryption scheme for wireless sensor networks. We first review briefly about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms, then describe an authenticated identity-based key encryption scheme based on Boneh-Franklin algorithms, and finally show the integrity of our scheme and discuss its efficiency and security by comparing it with other asymmetric and symmetric encryption schemes. 25 Refs. In English.
Key words: identity-based encryption scheme; network security; Boneh-Franklin algorithms; wireless sensor network
中图分类号:
TP393
CHENG Hong-bing;YANG Geng; WANG Jiang-tao;HUANG Xiao. An authenticated identity-based key establishment and encryption scheme for wireless sensor networks[J]. Acta Metallurgica Sinica(English letters), doi: 1005-8885(2006)02-0031-08 .
0 / / 推荐
导出引用管理器 EndNote|Ris|BibTeX
链接本文: https://jcupt.bupt.edu.cn/CN/1005-8885(2006)02-0031-08
https://jcupt.bupt.edu.cn/CN/Y2006/V13/I2/31