J4 ›› 2015, Vol. 37 ›› Issue (10): 1856-1861.
• 论文 • Previous Articles Next Articles
WEN Song,WU Zhao,ZHENG Yi
Received:
Revised:
Online:
Published:
Abstract:
We proposed an efficient identitybased keys updating scheme in wireless sensor networks (WSN), in which the trusted computing platform serves as the key generation center, and the oneway function is used to construct a random pool. The scheme enables sensor nodes to verify key updating messages without causing excessive network traffic. To ensure the security of the keys, the scheme uses the trusted computing platform as the key generation center to ensure the security of the key source. When keys are updated, the features of the trusted computing platform can be used to validate the platform configurations and determine the authenticity and integrity of the messages and the keys in question. Oneway function is used for generating a random pool, so that sensor nodes can verify the authenticity of the messages and resist replay attacks.
Key words: wireless sensor network (WSN);identity-based cryptographic (IBC);trusted computing platform
WEN Song,WU Zhao,ZHENG Yi. A WSN identity-based keys updating method based on trusted computing platform[J]. J4, 2015, 37(10): 1856-1861.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2015/V37/I10/1856