Please wait a minute...
J4  2009, Vol. 43 Issue (8): 1396-1400    DOI: 10.3785/j.issn.1008-973X.2009.
计算机科学技术     
无线传感器网络中高效的基于身份的加密算法
贾晨军1,廖永建2,陈抗生1
(1.浙江大学 信息与电子工程学系, 浙江 杭州 310027; 2.电子科技大学 计算机科学与工程学院, 四川 成都 610054)
Efficient identity-based encryption algorithm in wireless sensor networks
 GU Chen-Jun1, LIAO Yong-Jian2, CHEN Gang-Sheng1
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. School
of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610054, China
 全文: PDF(580 KB)  
摘要:

无线传感器网络节点的通信和计算能力非常有限,使得传统的公钥加密算法无法有效应用,为此提出了一种安全的轻量级的加密算法.基于身份的密码系统简化了基于证书的密码系统繁琐的密钥管理过程,根据无线传感器网络自身的特点,对现有的基于身份的加密算法安全模型进行改进,提出了一个新的安全模型,并在此基础上提出了一种在标准模式下可证明安全的基于身份的加密算法.与现有的基于身份的加密算法相比,提出的加密算法存储需求更小、计算量更少,更加适合于无线传感器网络.

关键词: 无线传感器网络安全模型随机预言机标准模式基于身份的加密    
Abstract:

As the key technology of pervasive computing, wireless sensor network’s (WSN’s) node is very limited in its energy, processing power, storage capacity and communication capability, so it’s usually  considered unsuitable for the use of public key encryption technology. But the identity-based encryption (IBE) makes it possible to use public key encryption technology in WSN. IBE system simplifies the certificate management which is cumbersome in the certificate-based public key system. According to the features of WSN, the security model of IBE system was modified and an IBE system was proposed, which was proved secure in the new security model without random oracle. Comparison with previous IBE system showed that the proposed system needs less storage and is more efficient. So the proposed system is more suitable for WSN.

Key words: wireless sensor network (WSN)    security model    random oracle    standard mode    identity-based encryption (IBE)
出版日期: 2009-09-01
:  TN 918.911  
基金资助:

国家自然科学基金资助项目(60602023).

通讯作者: 陈抗生,男,教授,博导.     E-mail: chenks@zju.edu.cn
作者简介: 贾晨军(1978-),男,青海西宁人,博士生,从事密码算法研究.
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
贾晨军
廖永建
陈抗生

引用本文:

贾晨军, 廖永建, 陈抗生. 无线传感器网络中高效的基于身份的加密算法[J]. J4, 2009, 43(8): 1396-1400.

GU Chen-Jun, LIAO Yong-Jian, CHEN Gang-Sheng. Efficient identity-based encryption algorithm in wireless sensor networks. J4, 2009, 43(8): 1396-1400.

链接本文:

http://www.zjujournals.com/xueshu/eng/CN/10.3785/j.issn.1008-973X.2009.        http://www.zjujournals.com/xueshu/eng/CN/Y2009/V43/I8/1396

[1] LAI Bo-cheng, KIM S, VERBAUWHEDE I. Scalable session key construction protocol for wireless sensor networks [C]∥ Proceedings of IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES). Austin: IEEE, 2002.
[2] BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [C]∥ Proceedings of CRYPTO’92. Berlin: Springer-Verlag, 1992: 471-486.
[3] ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [C]∥ Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 41-47.
[4] CHAN Hao-wen, PERRIG A, SONG Xiao-dong. Random key predistribution schemes for sensor networks [C]∥ IEEE Symposium on Security and Privacy. Washington: IEEE, 2003.
[5] SHAMIR A. Identity-based cryptosystems and signature schemes [C]∥ Proceedings of CRYPTO’84. Berlin: Springer-Verlag, 1984: 47-53.
[6] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [C]∥ Proceedings of CRYPTO’01. Berlin: Springer-Verlag, 2001: 213-229.
[7] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
[8] BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’04. Berlin: Springer-Verlag, 2004: 223-238.
[9] BONEH D, BOYEN X. Secure identity based encryption without random oracles [C]∥ Proceedings of CRYPTO’04. Berlin: Springer-Verlag, 2004: 443-459.
[10] WATERS B. Efficient identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’05. Berlin: Springer-Verlag, 2005: 114-127.
[11] GENTRY C. Practical identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’06. Berlin: Springer-Verlag, 2006: 445-464.
[12] ROMAN R, ALCARAZ C. Applicability of public key infrastructures in wireless sensor networks [C]∥ Proceedings of EuroPKI’07. Berlin: Springer-Verlag, 2007: 313-320.
[13] YANG Geng, RONG Chun-ming, CHRISTIAN V, et al. Identity-based key agreement and encryption for wireless sensor networks [J]. The Journal of China Universities of Posts and Telecommunications, 2006, 13(4): 54-60.
[14] SILVERMAN J H. The arithmetic of elliptic curves [M]. 3rd ed. Berlin: Springer-Verlag, 1994.
[15] DU Wen-liang, WANG Rong-hua, NING Peng. An efficient scheme for authenticating public keys in sensor networks [C]∥ Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing. New York: ACM, 2005: 58-67.

[1] 肖璟博, 陈敏, 刘云涛, 刘云超, 陈杰. 水质监测传感器数据采集节点的设计和实现[J]. 浙江大学学报(工学版), 2017, 51(7): 1446-1452.
[2] 钱良芳, 张森林, 刘妹琴. 基于预约的数据队列水下无线传感器网络MAC协议[J]. 浙江大学学报(工学版), 2017, 51(4): 691-696.
[3] 董利达,黄聪,管林波. 基于双树结构的无线HART调度策略[J]. J4, 2014, 48(3): 391-397.
[4] 潘雄振,蒋铃鸽,何晨. CRSN中一种基于频谱已知的多信道机会路由协议[J]. J4, 2014, 48(3): 384-390.
[5] 容志能,金文光,骆一希. 人体运动传感数据的无线采集方案设计[J]. J4, 2012, 46(7): 1314-1319.
[6] 鲍必赛, 伍健荣, 楼晓俊, 刘海涛. 基于二维特征矩阵的特征融合算法[J]. J4, 2012, 46(11): 2081-2088.
[7] 高庆,李善平,杨朝晖. 基于虚拟场的能量高效传感器网络地理路由[J]. J4, 2012, 46(1): 98-104.
[8] 潘巨龙,李善平,张道远. 无线传感器网络簇内可疑节点的博弈检测方法[J]. J4, 2012, 46(1): 72-78.
[9] 朴云,董利达,丁力. 能够克服局部NLOS影响的自主移动节点定位方法[J]. J4, 2011, 45(7): 1147-1153.
[10] 夏明, 董亚波, 鲁东明. 无线传感网逐跳自适应FEC传输可靠性
保证方法
[J]. J4, 2011, 45(2): 273-279.
[11] 杨波, 邹富强. 异向性磁阻传感器检测车流量的新方法[J]. J4, 2011, 45(12): 2109-2114.
[12] 陈友荣, 俞立, 董齐芬, 洪榛. 基于近邻算法的无线传感器网络功率控制[J]. J4, 2010, 44(7): 1321-1326.
[13] 姜励, 陈健, 平玲娣, 陈小平. 多线程程序的信息抹除和降密安全策略[J]. J4, 2010, 44(5): 854-862.
[14] 蔡文郁, 唐军, 张昱. 无线传感器网络MDC视频传输的跨层多径路由协议[J]. J4, 2010, 44(1): 61-67.
[15] 黄勇, 陈小平, 陈文智, 等. 支持动态调节的保密性和完整性统一模型[J]. J4, 2009, 43(8): 1377-1382.