Security

Secure Authentication Scheme Based on IBE

Free registration required

Executive Summary

Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. The authors propose an IBE-based authentication protocol as the security scheme, which can achieve the key establishment and security authentication. The security of the authentication protocol is analyzed based on BAN logic. The simulation shows, comparing with previous key-establishment solutions, their approaches need little storage space, and can gain stronger security and reasonable performance efficiency.

  • Format: PDF
  • Size: 434.72 KB