2012
DOI: 10.4304/jcp.7.8.1847-1852
|View full text |Cite
|
Sign up to set email alerts
|

Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks

Abstract: In order to integrate identity authentication and key agreement, a novel academic thought is set out, a fasting one-way accumulator is constructed, and a fasting one-way accumulator-based key management protocol is put forward for Heterogeneous Sensor Networks (HSNs). The experiments and analysis show that the proposed protocol not only implements identity authentication function, but has high connectivity and security, low energy consumption as well.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Many recent WSN key management studies proposed a hierarchical architecture for networks, which are composed of a BS, a CH, and SNs [19]- [21]. This is because SNs make it hard to apply a high computational cryptographic method due to inadequate hardware performance.…”
Section: ) Random Key Predistributionmentioning
confidence: 99%
“…Many recent WSN key management studies proposed a hierarchical architecture for networks, which are composed of a BS, a CH, and SNs [19]- [21]. This is because SNs make it hard to apply a high computational cryptographic method due to inadequate hardware performance.…”
Section: ) Random Key Predistributionmentioning
confidence: 99%
“…According to Ma’s study [ 85 ], we assume one WSN that adopts MICA2 and, integrates an 8 bit 8 MHz ATmega128L processor with the voltage is 3 V, the computational electric current is 8 mA, the received electric current is 10 mA, the transmitted electric current is 27 mA, and the transmission rate is 12.4 kb/s. Therefore, the executed 0.00032 s computation needs 3 V × 8 mA × 0.00032 s = 0.00768 mJ.…”
Section: Performance Analysismentioning
confidence: 99%
“…We assume that the receiving electric current of WSNs is 10 mA, the transmitting electric current is 27 mA, and the rate of transmission is 12.4 kb/s. According to Ma’s study [ 85 ], we assume that 1-byte transmission consumption is 3 V × 27 mA × 8 b/12400 b/s = 0.052mJ and a received byte consumption is 3 V × 10 mA × 8 b/12400 b/s = 0.019 mJ.…”
Section: Performance Analysismentioning
confidence: 99%
“…Assuming VIC (Voiceprint Identification Center) is the the voiceprint identification center, which is a trusted voiceprint management institutions [6] [7]. If each of A and B has an encrypted connection to the VIC, VIC can safely pass an encryption key to A and B via encrypted connection respectively.…”
Section: An Identity Authentication Scheme Based On Speaker Verifmentioning
confidence: 99%