Acta Metallurgica Sinica(English letters)

• Network • Previous Articles     Next Articles

An authenticated identity-based key establishment and encryption scheme for wireless sensor networks

CHENG Hong-bing;YANG Geng; WANG Jiang-tao;HUANG Xiao   

  1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2005-11-14 Revised:1900-01-01 Online:2006-11-23
  • Contact: CHENG Hong-bing

Abstract: Security of wireless sensor networks has received considerable attention. It is a critical challenge to find out suitable encryption schemes for wireless sensor networks due to limitations of power, computation capability and storage resources of these networks. Many encryption schemes based on asymmetric and symmetric have been investigated. In this paper, we present an authenticated identity-based key encryption scheme for wireless sensor networks. We first review briefly about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms, then describe an authenticated identity-based key encryption scheme based on Boneh-Franklin algorithms, and finally show the integrity of our scheme and discuss its efficiency and security by comparing it with other asymmetric and symmetric encryption schemes. 25 Refs. In English.

Key words: identity-based encryption scheme; network security; Boneh-Franklin algorithms; wireless sensor network

CLC Number: