Please wait a minute...
J4  2009, Vol. 43 Issue (8): 1396-1400    DOI: 10.3785/j.issn.1008-973X.2009.
    
Efficient identity-based encryption algorithm in wireless sensor networks
 GU Chen-Jun1, LIAO Yong-Jian2, CHEN Gang-Sheng1
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. School
of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610054, China
Download:   PDF(580KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

As the key technology of pervasive computing, wireless sensor network’s (WSN’s) node is very limited in its energy, processing power, storage capacity and communication capability, so it’s usually  considered unsuitable for the use of public key encryption technology. But the identity-based encryption (IBE) makes it possible to use public key encryption technology in WSN. IBE system simplifies the certificate management which is cumbersome in the certificate-based public key system. According to the features of WSN, the security model of IBE system was modified and an IBE system was proposed, which was proved secure in the new security model without random oracle. Comparison with previous IBE system showed that the proposed system needs less storage and is more efficient. So the proposed system is more suitable for WSN.



Published: 28 September 2009
CLC:  TN 918.911  
Cite this article:

GU Chen-Jun, LIAO Yong-Jian, CHEN Gang-Sheng. Efficient identity-based encryption algorithm in wireless sensor networks. J4, 2009, 43(8): 1396-1400.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2009.     OR     http://www.zjujournals.com/eng/Y2009/V43/I8/1396


无线传感器网络中高效的基于身份的加密算法

无线传感器网络节点的通信和计算能力非常有限,使得传统的公钥加密算法无法有效应用,为此提出了一种安全的轻量级的加密算法.基于身份的密码系统简化了基于证书的密码系统繁琐的密钥管理过程,根据无线传感器网络自身的特点,对现有的基于身份的加密算法安全模型进行改进,提出了一个新的安全模型,并在此基础上提出了一种在标准模式下可证明安全的基于身份的加密算法.与现有的基于身份的加密算法相比,提出的加密算法存储需求更小、计算量更少,更加适合于无线传感器网络.

[1] LAI Bo-cheng, KIM S, VERBAUWHEDE I. Scalable session key construction protocol for wireless sensor networks [C]∥ Proceedings of IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES). Austin: IEEE, 2002.
[2] BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [C]∥ Proceedings of CRYPTO’92. Berlin: Springer-Verlag, 1992: 471-486.
[3] ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [C]∥ Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 41-47.
[4] CHAN Hao-wen, PERRIG A, SONG Xiao-dong. Random key predistribution schemes for sensor networks [C]∥ IEEE Symposium on Security and Privacy. Washington: IEEE, 2003.
[5] SHAMIR A. Identity-based cryptosystems and signature schemes [C]∥ Proceedings of CRYPTO’84. Berlin: Springer-Verlag, 1984: 47-53.
[6] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [C]∥ Proceedings of CRYPTO’01. Berlin: Springer-Verlag, 2001: 213-229.
[7] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
[8] BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’04. Berlin: Springer-Verlag, 2004: 223-238.
[9] BONEH D, BOYEN X. Secure identity based encryption without random oracles [C]∥ Proceedings of CRYPTO’04. Berlin: Springer-Verlag, 2004: 443-459.
[10] WATERS B. Efficient identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’05. Berlin: Springer-Verlag, 2005: 114-127.
[11] GENTRY C. Practical identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’06. Berlin: Springer-Verlag, 2006: 445-464.
[12] ROMAN R, ALCARAZ C. Applicability of public key infrastructures in wireless sensor networks [C]∥ Proceedings of EuroPKI’07. Berlin: Springer-Verlag, 2007: 313-320.
[13] YANG Geng, RONG Chun-ming, CHRISTIAN V, et al. Identity-based key agreement and encryption for wireless sensor networks [J]. The Journal of China Universities of Posts and Telecommunications, 2006, 13(4): 54-60.
[14] SILVERMAN J H. The arithmetic of elliptic curves [M]. 3rd ed. Berlin: Springer-Verlag, 1994.
[15] DU Wen-liang, WANG Rong-hua, NING Peng. An efficient scheme for authenticating public keys in sensor networks [C]∥ Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing. New York: ACM, 2005: 58-67.

No related articles found!