Skip to main content

An Identity-Based Key Management Scheme for Wireless Sensor Networks
draft-qin-cfrg-ibkm-wsn-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Zhongyuan Qin , Jie Huang , Xinshuai Zhang
Last updated 2015-09-24 (Latest revision 2015-03-23)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document specifies an efficient identity-based key management (IBKM) scheme in wireless sensor networks (WSNs),where the nodes are resource-limited, i.e., low computing capacity, small memory, power supply limitations and price,etc. This scheme exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.

Authors

Zhongyuan Qin
Jie Huang
Xinshuai Zhang

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)