中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 期刊论文
题名:
an efficient location-based compromise-tolerant key management scheme for sensor networks
作者: Duan Mei-Jiao ; Xu Jing
关键词: Cryptography ; Information management ; Network management ; Sensor nodes ; Sensors ; Telecommunication equipment ; Wireless networks
刊名: Information Processing Letters
发表日期: 2011
卷: 111, 期:11, 页:503-507
收录类别: EI
部门归属: (1) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China
英文摘要: Location information has been paid much more attention in sensor network key management schemes. In 2006, Zhang et al. proposed a location-based key management scheme by binding private keys of individual nodes to both their identities and locations. In this Letter, however, we show that their scheme cannot resist key compromise impersonation (KCI) attack, and does not achieve forward secrecy. In fact, an adversary who compromises the location-based secret key of a sensor node A, can masquerade as any other legitimate node or even fake a node to establish the shared key with A, as well as decrypt all previous messages exchanged between A and its neighboring nodes. We then propose a new scheme which provides KCI resilience, perfect forward secrecy and is also immune to various known types of attacks. Moreover, our scheme does not require any pairing operation or map-to-point hash operation, which is more efficient and more suitable for low-power sensor nodes. © 2011 Elsevier B.V. All rights reserved.
WOS记录号: WOS:000290743500001
Citation statistics:
内容类型: 期刊论文
URI标识: http://ir.iscas.ac.cn/handle/311060/14071
Appears in Collections:信息安全国家重点实验室_期刊论文

Files in This Item:
File Name/ File Size Content Type Version Access License
An efficient location-based compromise-tolerant key management scheme for sensor networks.pdf(144KB)----限制开放-- 联系获取全文

Recommended Citation:
Duan Mei-Jiao,Xu Jing. an efficient location-based compromise-tolerant key management scheme for sensor networks[J]. Information Processing Letters,2011-01-01,111(11):503-507.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Duan Mei-Jiao]'s Articles
[Xu Jing]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Duan Mei-Jiao]‘s Articles
[Xu Jing]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace