• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (10): 1856-1861.

• 论文 • Previous Articles     Next Articles

A WSN identity-based keys updating method
based on trusted computing platform

WEN Song,WU Zhao,ZHENG Yi   

  1. (School of Mathematics and Computer Science,School of Hubei Art and Science,Xiangyang 441053,China)
  • Received:2015-07-02 Revised:2015-09-07 Online:2015-10-25 Published:2015-10-25

Abstract:

We proposed an efficient identitybased keys updating scheme in wireless sensor networks (WSN), in which the trusted computing platform serves as the key generation center, and the oneway function is used to construct a random pool. The scheme enables sensor nodes to verify key updating messages without causing excessive network traffic. To ensure the security of the keys, the scheme uses the trusted computing platform as the key generation center to ensure the security of the key source. When keys are updated, the features of the trusted computing platform can be used to validate the platform configurations and determine the authenticity and integrity of the messages and the keys in question. Oneway function is used for generating a random pool, so that sensor nodes can verify the authenticity of the messages and resist replay attacks.

Key words: wireless sensor network (WSN);identity-based cryptographic (IBC);trusted computing platform