2006
DOI: 10.1016/s1005-8885(07)60034-x
|View full text |Cite
|
Sign up to set email alerts
|

Identity-based key agreement and encryption for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…ID-based key agreement scheme Yang et al (2006) proposed ID-based key agreement scheme. This scheme consists of the following steps.…”
Section: Id-based Key Agreement Schemesmentioning
confidence: 99%
“…ID-based key agreement scheme Yang et al (2006) proposed ID-based key agreement scheme. This scheme consists of the following steps.…”
Section: Id-based Key Agreement Schemesmentioning
confidence: 99%
“…The authors in [5], [23], [16] envisioned the use of Identity-Based Encryption (IBE) as a security solution for sensor networks. All three papers proposed the Boneh and Franklin identity-based encryption scheme [3] to distribute keys in the network.…”
Section: Related Workmentioning
confidence: 99%
“…In [23] the IBE scheme was evaluated through a simulation on a desktop class computer. The relevance of the achieved results to WSNs is not clear, as simulation details were not presented.…”
Section: Related Workmentioning
confidence: 99%
“…This fact enables practical implementations of IBE schemes and thus opens new ways for achieving security in sensor networks. The authors in [15], [16], [17] envisioned the use of IBE as a security solution for WSNs. All three papers proposed the Boneh and Franklin IBE scheme [18].…”
Section: Related Workmentioning
confidence: 99%
“…Previous proposals for using IBE in sensor networks [16], [17] suggested the Boneh and Franklin scheme [18] for key distribution. However this protocol is symmetric in nature and requires expensive operations for both encryption and decryption.…”
Section: Tinyibe Schemementioning
confidence: 99%