Academic Journals Database
Disseminating quality controlled scientific knowledge

Secure Authentication Scheme based on IBE

ADD TO MY LIST
 
Author(s): Feng-Yu Lei | Guo-Hua Cui | Cai Fu | Peng Xu | Jing Chen

Journal: Journal of Networks
ISSN 1796-2056

Volume: 5;
Issue: 9;
Start page: 1106;
Date: 2010;
Original page

Keywords: CPK | security | BAN | wireless sensor networks

ABSTRACT
Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establishment and security authentication. The security of the authentication protocol is analyzed based on BAN logic. The simulation shows, comparing with previous key-establishment solutions, our approaches need little storage space, and can gain stronger security and reasonable performance efficiency.
Affiliate Program      Why do you need a reservation system?