Author(s): Feng-Yu Lei | Guo-Hua Cui | Cai Fu | Peng Xu | Jing Chen
Journal: Journal of Networks
ISSN 1796-2056
Volume: 5;
Issue: 9;
Start page: 1106;
Date: 2010;
Original page
Keywords: CPK | security | BAN | wireless sensor networks
ABSTRACT
Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establishment and security authentication. The security of the authentication protocol is analyzed based on BAN logic. The simulation shows, comparing with previous key-establishment solutions, our approaches need little storage space, and can gain stronger security and reasonable performance efficiency.
Journal: Journal of Networks
ISSN 1796-2056
Volume: 5;
Issue: 9;
Start page: 1106;
Date: 2010;
Original page
Keywords: CPK | security | BAN | wireless sensor networks
ABSTRACT
Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establishment and security authentication. The security of the authentication protocol is analyzed based on BAN logic. The simulation shows, comparing with previous key-establishment solutions, our approaches need little storage space, and can gain stronger security and reasonable performance efficiency.