An Identity-Based Key Management Scheme for Wireless Sensor Networks
draft-qin-cfrg-ibkm-wsn-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Zhongyuan Qin , Jie Huang , Xinshuai Zhang | ||
Last updated | 2015-09-24 (Latest revision 2015-03-23) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document specifies an efficient identity-based key management (IBKM) scheme in wireless sensor networks (WSNs),where the nodes are resource-limited, i.e., low computing capacity, small memory, power supply limitations and price,etc. This scheme exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.
Authors
Zhongyuan Qin
Jie Huang
Xinshuai Zhang
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)