Acta Metallurgica Sinica(English letters)
• Network • Previous Articles Next Articles
CHENG Hong-bing;YANG Geng; WANG Jiang-tao;HUANG Xiao
Received:
Revised:
Online:
Contact:
Abstract: Security of wireless sensor networks has received considerable attention. It is a critical challenge to find out suitable encryption schemes for wireless sensor networks due to limitations of power, computation capability and storage resources of these networks. Many encryption schemes based on asymmetric and symmetric have been investigated. In this paper, we present an authenticated identity-based key encryption scheme for wireless sensor networks. We first review briefly about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms, then describe an authenticated identity-based key encryption scheme based on Boneh-Franklin algorithms, and finally show the integrity of our scheme and discuss its efficiency and security by comparing it with other asymmetric and symmetric encryption schemes. 25 Refs. In English.
Key words: identity-based encryption scheme; network security; Boneh-Franklin algorithms; wireless sensor network
CLC Number:
TP393
CHENG Hong-bing;YANG Geng; WANG Jiang-tao;HUANG Xiao. An authenticated identity-based key establishment and encryption scheme for wireless sensor networks[J]. Acta Metallurgica Sinica(English letters), doi: 1005-8885(2006)02-0031-08 .
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: https://jcupt.bupt.edu.cn/EN/1005-8885(2006)02-0031-08
https://jcupt.bupt.edu.cn/EN/Y2006/V13/I2/31