National Changhua University of Education Institutional Repository : Item 987654321/12164
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 6469/11641
造访人次 : 16932163      在线人数 : 417
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 进阶搜寻

jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://ir.ncue.edu.tw/ir/handle/987654321/12164

题名: A Scalable ID-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks
作者: Lin, Huan-Chung;Tseng, Yuh-Min
贡献者: 數學系
关键词: Wireless sensor networks;Identity based;Elliptic Curve Cryptography;Key establishment
日期: 2007-07
上传时间: 2012-07-03T03:45:02Z
出版者: 中華民國電腦學會
摘要: Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number of applications. The WSN systems are usually deployed in hostile environments where they encountered a wide variety of malicious attacks. In order to protect the transmitted messages between any two adjacent sensor nodes, a mutual authentication and key exchange protocol is required for wireless sensor networks. Because some nature restrictions of sensor nodes which include low power, less storage space, low computation ability and short communication range, most existing protocols attempt to establish a pairwise key between any two adjacent sensor nodes by adopting a key pre-distribution approach. However, this approach has some inherent drawbacks. With rapid growth of cryptographic techniques, recent results show that Elliptic Curve Cryptography (ECC) is suitable for resource-limited WSNs. In this paper, we propose a scalable ID-based pairwise key establishment protocol that allows a sensor node can establish session keys with all one-hop adjacent nodes by one broadcast message. Compared to other existing protocols, our protocol offers two important advantages: (1) each node requires only constant memory storage, so the proposed protocol is scalable; (2) it ensures that a sensor node can directly establish secure communications with other adjacent nodes, so that the entire connectivity of the network is guaranteed. We show that it can withstand the compromise attack with captured nodes. A performance analysis demonstrates that our protocol is well suited for resource-limited WSNs.
關聯: Journal of Computers, 18(2): 13-24
显示于类别:[數學系] 期刊論文

文件中的档案:

档案 大小格式浏览次数
index.html0KbHTML424检视/开启


在NCUEIR中所有的数据项都受到原著作权保护.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈