Many broadcast encryption schemes have been proposed for conventional networks. However, those schemes are not suitable for wireless sensor networks, which have very limited resources such as communication, computation, and storage. In this paper, we propose an efficient and practical identity-based broadcast encryption scheme for sensor networks by exploiting the characteristics of sensor networks: in the deployment stage, the set of neighboring sensor nodes are determined and most communications are conducted among the neighbors due to radio power limitations of the nodes. The proposed scheme features the following achievements: (1) all of the public keys and private keys are of constant size; (2) it satisfies all the security requirements for sensor networks. The proposed scheme is optimal in the sense that it requires no pairing operation when adopting pre-computation.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Intae KIM, SeongOun HWANG, "An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks" in IEICE TRANSACTIONS on Communications,
vol. E96-B, no. 3, pp. 891-895, March 2013, doi: 10.1587/transcom.E96.B.891.
Abstract: Many broadcast encryption schemes have been proposed for conventional networks. However, those schemes are not suitable for wireless sensor networks, which have very limited resources such as communication, computation, and storage. In this paper, we propose an efficient and practical identity-based broadcast encryption scheme for sensor networks by exploiting the characteristics of sensor networks: in the deployment stage, the set of neighboring sensor nodes are determined and most communications are conducted among the neighbors due to radio power limitations of the nodes. The proposed scheme features the following achievements: (1) all of the public keys and private keys are of constant size; (2) it satisfies all the security requirements for sensor networks. The proposed scheme is optimal in the sense that it requires no pairing operation when adopting pre-computation.
URL: https://globals.ieice.org/en_transactions/communications/10.1587/transcom.E96.B.891/_p
Copy
@ARTICLE{e96-b_3_891,
author={Intae KIM, SeongOun HWANG, },
journal={IEICE TRANSACTIONS on Communications},
title={An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks},
year={2013},
volume={E96-B},
number={3},
pages={891-895},
abstract={Many broadcast encryption schemes have been proposed for conventional networks. However, those schemes are not suitable for wireless sensor networks, which have very limited resources such as communication, computation, and storage. In this paper, we propose an efficient and practical identity-based broadcast encryption scheme for sensor networks by exploiting the characteristics of sensor networks: in the deployment stage, the set of neighboring sensor nodes are determined and most communications are conducted among the neighbors due to radio power limitations of the nodes. The proposed scheme features the following achievements: (1) all of the public keys and private keys are of constant size; (2) it satisfies all the security requirements for sensor networks. The proposed scheme is optimal in the sense that it requires no pairing operation when adopting pre-computation.},
keywords={},
doi={10.1587/transcom.E96.B.891},
ISSN={1745-1345},
month={March},}
Copy
TY - JOUR
TI - An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
T2 - IEICE TRANSACTIONS on Communications
SP - 891
EP - 895
AU - Intae KIM
AU - SeongOun HWANG
PY - 2013
DO - 10.1587/transcom.E96.B.891
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E96-B
IS - 3
JA - IEICE TRANSACTIONS on Communications
Y1 - March 2013
AB - Many broadcast encryption schemes have been proposed for conventional networks. However, those schemes are not suitable for wireless sensor networks, which have very limited resources such as communication, computation, and storage. In this paper, we propose an efficient and practical identity-based broadcast encryption scheme for sensor networks by exploiting the characteristics of sensor networks: in the deployment stage, the set of neighboring sensor nodes are determined and most communications are conducted among the neighbors due to radio power limitations of the nodes. The proposed scheme features the following achievements: (1) all of the public keys and private keys are of constant size; (2) it satisfies all the security requirements for sensor networks. The proposed scheme is optimal in the sense that it requires no pairing operation when adopting pre-computation.
ER -