{"title":"基于椭圆曲线加密的无线传感器网络节能密钥管理方案","authors":"E. Hagras, Doaa El-Saied, Hazem H. Aly","doi":"10.1109/NRSC.2011.5873614","DOIUrl":null,"url":null,"abstract":"In this paper, an efficient key management scheme based on public key elliptic curves signcryption (ECS) scheme for Wireless Sensor Networks (WSN) has been proposed. The proposed algorithm is compared with the scheme given in [1]. For 250 cluster node, the saving in the total number of operations, key storage requirements, energy consumptions, and communication overhead are 75%, 96%, 23.79 m Joule, and 40% respectively compared with [1]. The proposed protocol is efficient in terms of complexity, number of message exchange, computation, and storage requirements compared with [1]. The proposed key management possesses not only provided confidentiality, authentication, integrity but also unforgeability.","PeriodicalId":438638,"journal":{"name":"2011 28th National Radio Science Conference (NRSC)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks\",\"authors\":\"E. Hagras, Doaa El-Saied, Hazem H. Aly\",\"doi\":\"10.1109/NRSC.2011.5873614\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an efficient key management scheme based on public key elliptic curves signcryption (ECS) scheme for Wireless Sensor Networks (WSN) has been proposed. The proposed algorithm is compared with the scheme given in [1]. For 250 cluster node, the saving in the total number of operations, key storage requirements, energy consumptions, and communication overhead are 75%, 96%, 23.79 m Joule, and 40% respectively compared with [1]. The proposed protocol is efficient in terms of complexity, number of message exchange, computation, and storage requirements compared with [1]. The proposed key management possesses not only provided confidentiality, authentication, integrity but also unforgeability.\",\"PeriodicalId\":438638,\"journal\":{\"name\":\"2011 28th National Radio Science Conference (NRSC)\",\"volume\":\"373 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 28th National Radio Science Conference (NRSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NRSC.2011.5873614\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 28th National Radio Science Conference (NRSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NRSC.2011.5873614","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
摘要
提出了一种基于公钥椭圆曲线签名加密(ECS)的无线传感器网络密钥管理方案。将该算法与[1]中给出的方案进行了比较。对于250个集群节点,与[1]相比,总操作次数、关键存储需求、能耗和通信开销分别节省75%、96%、23.79 m Joule和40%。与[1]相比,该协议在复杂度、消息交换数量、计算量和存储需求等方面都具有较高的效率。所提出的密钥管理方法不仅具有保密性、认证性、完整性,而且具有不可伪造性。
Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks
In this paper, an efficient key management scheme based on public key elliptic curves signcryption (ECS) scheme for Wireless Sensor Networks (WSN) has been proposed. The proposed algorithm is compared with the scheme given in [1]. For 250 cluster node, the saving in the total number of operations, key storage requirements, energy consumptions, and communication overhead are 75%, 96%, 23.79 m Joule, and 40% respectively compared with [1]. The proposed protocol is efficient in terms of complexity, number of message exchange, computation, and storage requirements compared with [1]. The proposed key management possesses not only provided confidentiality, authentication, integrity but also unforgeability.