: An efficient identity-based broadcast authentication scheme in wireless sensor networks
Tài liệu tham khảo
Aranha, 2011, Faster explicit formulas for computing pairings over ordinary curves, 8
Barreto, 2002, Efficient algorithms for pairing-based cryptosystems, 354
Barreto, 2007, Efficient pairing computation on supersingular abelian varieties, Design, Codes and Cryptography, 42, 239, 10.1007/s10623-006-9033-6
Barreto, 2005, Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, 515
Boneh, 2004, Short signatures from the weil pairing, Journal of Cryptology, 17, 297, 10.1007/s00145-004-0314-9
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxanomy and some efficient constructions, in: Proceedings of INFOCOMM’99, 1999, pp. 708–710.
Cao, 2008, IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks, Computer communications, 31, 659, 10.1016/j.comcom.2007.10.017
S. Cheng, An efficient message authentication scheme for link state routing, in: Proceedings of ACSAC’97, 1997, pp. 90–98.
J. Drissi, Q. Gu, Localized broadcast authentication in large sensor networks, in: Proceeding of ICNS’06, 2007, pp. 341–350.
Galbraith, 2005, Pairings, advances in elliptic curve cryptography, vol. 317, 183, 10.1017/CBO9780511546570.011
Galindo, 2008, A killer application for pairings: authenticated key establishment in underwater wireless sensor networks, 120
Gaubatz, 2005, Public key cryptography in sensor networks-revisited, 2
N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, in: Proceedings of CHES’04, 2004, pp. 119–132.
Hess, 2003, Efficient identity based signature schemes based on pairings, 310
Hess, 2006, The Eta pairing revisited, IEEE Transactions on Information Theory, 52, 4595, 10.1109/TIT.2006.881709
T. Ishiguro, M. Shirase, T. Takagi, Efficient Implementation of Pairings on Sensor Nodes, in: Identity Based Encryption Workshop, NIST, 2008. <http://csrc.nist.gov/groups/ST/IBE/documents/June08/Takagi.pdf>.
A. Kansal, D. Potter, M. Srivastava, Performance aware tasking for environmentally powered sensor networks, in: Proceedings of SIGMETRICS’04, 2004, pp. 223–234.
Kocher, 1996, Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems, 104
Kocher, 1999, Differential power analysis, 388
Kwon, 2010, Secure and efficient broadcast authentication in wireless sensor networks, IEEE Transactions on Computers, 59, 1120, 10.1109/TC.2009.171
A. Liu, P. Kampanakis, P. Ning, TinyECC: Elliptic Curve Cryptography for Sensor Networks (Ver. 0.3), 2005. <http://discovery.csc.ncsu.edu/software/TinyECC/>.
Lorincz, 2004, Sensor networks for emergency response: challenges and opportunities, IEEE Pervasive Computing Special Issue on Persive Computing for First Response, 3, 16, 10.1109/MPRV.2004.18
D. Liu, P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: Proceedings of NDSS’03, 2003, pp. 263–276.
Liu, 2004, Multi-level μTESLA: broadcast authentication for distributed sensor networks, ACM Transactions of Embedded Computing Systems, 3, 800, 10.1145/1027794.1027800
D. Liu, P. Ning, S. Zhu, S. Jajodia, Practical broadcast authentication in sensor networks, in: Proceedings of MobiQuitous’05, 2005, pp. 118–132.
D. Malan, M. Welsh, M. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceedings of SECON’04, 2004, pp. 71–80.
MICA2 Datasheet, 2006. <http://www.xbow.com/Products/Produc_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf>.
National Institute of Standards and Technology, Recommended Elliptic Curves for Federal Government Use, August, 1999.
Oliveira, 2011, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, Computer Communications, 34, 485, 10.1016/j.comcom.2010.05.013
L.B. Oliveira, D.F. Aranha, E. Morais, F. Daguano, J. Lopez, R. Dahab, TinyTate: computing the Tate pairing in resource-constrained nodes, in: Proceedings of NCA’07, 2007, pp. 318–323.
L.B. Oliveira, A. Kansal, B. Priyantha, M. Goraczko, F. Zhao, Secure-TWS: authenticating node to multi-user communication in shared sensor networks, in: Proceedings of IPSN’08, 2009, pp. 289–300.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of MobiCom’01, 2001, pp. 521–534.
Ren, 2009, Multi-user broadcast authentication in wireless sensor networks, IEEE Transactions on Vehicular Technology, 58, 4554, 10.1109/TVT.2009.2019663
Ren, 2007, On broadcast authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 6, 4136, 10.1109/TWC.2007.060255
Shamir, 1985, Identity-based cryptosystems and signature schemes, 47
Szczechowiak, 2009, On the application of pairing based cryptography to wireless sensor networks, 1
P. Szczechowiak, L. Oliveira, M. Scott, M. Collier, R. Dahab. NanoECC: testing the limits of elliptic curve cryptography in sensor networks, in: Proceedings of EWSN’08, LNCS 4913, 2008, pp. 305–320.
Tso, 2007, Efficient ID-based digital signatures with message recovery, 47
A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, pervasive computing and communications, in: Proceedings of PerCom’05, 2005, pp. 324–328.
H. Wang, Q. Li, Efficient implementation of public key cryptosystems on mote sensors, in: Proceedings of ICICS’06, 2006, pp. 519–528.