Multi-Node of Synergy Certificateless Authentication in WSNs

Article Preview

Abstract:

Certificateless Public Key Cryptography (CL-PKC) overcomes not only the key escrow problem in public key cryptography but also the cost of the certificate publishing and management in the Certificateless Public Key Cryptography (CL-PKC). No certificate public key cryptosystem just meet the requirements of this, but it relies on a special authentication server, which has high operating costs and lack of flexibility and it cannot meet the requirements of wireless sensor networks directly. Considering these problems, a multi-node of synergy certificateless authentication approach is proposed for WSN. The certificate of the nodes would be done by the certification set. And the set was consited of trusted neighbor nodes. Analysis indicates that this certification meets the security requirements of general wireless sensor networks and has advantages of low-cost and high efficiency.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3047-3051

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Al-Riyami S S,Paterson K.Certificateless public key crypt-ography:L NCS 2849: AS IACRYPT,2003.Verlag:Berlin Springer, (2003),p.273.

Google Scholar

[2] Cheng Zhaa-hui,Chen Li-qun,Ling Li,etal.General and effi-cient certificateless public key enerypfion eoustruetious:Takngi T. TNCS 4575: Pairing 2007.Verlag:Berlin Heridelberg Springer(2007),p.83.

Google Scholar

[3] Dent A W,A survey of certifieatelem enerypfion schems and seurity models.Cryptolngy eprint Archive,Report (2006).

Google Scholar

[4] XinYi Huang, YI Mu,Susilo W, et al.Certificateless Signature revisite-d:LNCS 4586:ACISP 2007.Verlag:Berlin Springer,(2007),p.308.

Google Scholar

[5] Zhang Z,Wong D S,Xu J,et al.Certificateless public key signature:Security model and efficient construction:ILNCS 3989:Applied Cryptography and Network Security 2006. Verlag:Berlin Springer.(2006),p.293.

DOI: 10.1007/11767480_20

Google Scholar

[6] Information on http://eprinLiaerDeg/2008/143

Google Scholar

[7] FuTai Zhang,XiaYin Sun and Lei Zhang: submitted to Journal Of Software (2011)

Google Scholar

[8] Yingzhi Zeng,JinShu Sun: submitted to Computer applications and software (2009)

Google Scholar