An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, smal...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2014-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/14/10/17937 |
_version_ | 1811263153400446976 |
---|---|
author | Zhongyuan Qin Xinshuai Zhang Kerong Feng Qunfang Zhang Jie Huang |
author_facet | Zhongyuan Qin Xinshuai Zhang Kerong Feng Qunfang Zhang Jie Huang |
author_sort | Zhongyuan Qin |
collection | DOAJ |
description | With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. |
first_indexed | 2024-04-12T19:40:51Z |
format | Article |
id | doaj.art-60316af1e5b547fc9d387d428d495a33 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-12T19:40:51Z |
publishDate | 2014-09-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-60316af1e5b547fc9d387d428d495a332022-12-22T03:19:06ZengMDPI AGSensors1424-82202014-09-011410179371795110.3390/s141017937s141017937An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom FilterZhongyuan Qin0Xinshuai Zhang1Kerong Feng2Qunfang Zhang3Jie Huang4School of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaSchool of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaSchool of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaComputer Department, Nanjing Institute of Artillery Corps, Nanjing 211132, ChinaSchool of Information Science and Engineering, Southeast University, Nanjing 210096, ChinaWith the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.http://www.mdpi.com/1424-8220/14/10/17937key managementidentity-based cryptographybloom filtersecuritywireless sensor network |
spellingShingle | Zhongyuan Qin Xinshuai Zhang Kerong Feng Qunfang Zhang Jie Huang An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter Sensors key management identity-based cryptography bloom filter security wireless sensor network |
title | An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter |
title_full | An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter |
title_fullStr | An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter |
title_full_unstemmed | An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter |
title_short | An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter |
title_sort | efficient identity based key management scheme for wireless sensor networks using the bloom filter |
topic | key management identity-based cryptography bloom filter security wireless sensor network |
url | http://www.mdpi.com/1424-8220/14/10/17937 |
work_keys_str_mv | AT zhongyuanqin anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT xinshuaizhang anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT kerongfeng anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT qunfangzhang anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT jiehuang anefficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT zhongyuanqin efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT xinshuaizhang efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT kerongfeng efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT qunfangzhang efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter AT jiehuang efficientidentitybasedkeymanagementschemeforwirelesssensornetworksusingthebloomfilter |