An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, smal...

Full description

Bibliographic Details
Main Authors: Zhongyuan Qin, Xinshuai Zhang, Kerong Feng, Qunfang Zhang, Jie Huang
Format: Article
Language:English
Published: MDPI AG 2014-09-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/14/10/17937
_version_ 1811263153400446976
author Zhongyuan Qin
Xinshuai Zhang
Kerong Feng
Qunfang Zhang
Jie Huang
author_facet Zhongyuan Qin
Xinshuai Zhang
Kerong Feng
Qunfang Zhang
Jie Huang
author_sort Zhongyuan Qin
collection DOAJ
description With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.
first_indexed 2024-04-12T19:40:51Z
format Article
id doaj.art-60316af1e5b547fc9d387d428d495a33
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-12T19:40:51Z
publishDate 2014-09-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-60316af1e5b547fc9d387d428d495a332022-12-22T03:19:06ZengMDPI AGSensors1424-82202014-09-011410179371795110.3390/s141017937s141017937An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom FilterZhongyuan Qin0Xinshuai Zhang1Kerong Feng2Qunfang Zhang3Jie Huang4School of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaSchool of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaSchool of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaComputer Department, Nanjing Institute of Artillery Corps, Nanjing 211132, ChinaSchool of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaWith the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.http://www.mdpi.com/1424-8220/14/10/17937key managementidentity-based cryptographybloom filtersecuritywireless sensor network
spellingShingle Zhongyuan Qin
Xinshuai Zhang
Kerong Feng
Qunfang Zhang
Jie Huang
An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
Sensors
key management
identity-based cryptography
bloom filter
security
wireless sensor network
title An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
title_full An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
title_fullStr An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
title_full_unstemmed An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
title_short An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
title_sort efficient identity based key management scheme for wireless sensor networks using the bloom filter
topic key management
identity-based cryptography
bloom filter
security
wireless sensor network
url http://www.mdpi.com/1424-8220/14/10/17937
work_keys_str_mv AT zhongyuanqin anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT xinshuaizhang anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT kerongfeng anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT qunfangzhang anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT jiehuang anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT zhongyuanqin efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT xinshuaizhang efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT kerongfeng efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT qunfangzhang efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter
AT jiehuang efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter