Cryptography Reference
In-Depth Information
5.6 Summary
Authentication has been one of the fundamental building blocks in security. In this
chapter, we review the existing non-ID-based authentication schemes and describe
their drawbacks. We then look into ID-based authentication schemes. Mainly, we dis-
cuss IBS, BNN-IBS, and its variant v BNN-IBS. Later, we review authenticated ses-
sion key-establishment schemes in WSN and discuss a pairing-free one-pass session
key-establishment scheme in WSN. In addition, we review a pairing-based encryption
scheme and end the discussion with revocation schemes for end users.
5.7 References
Bellare, M., C. Namprempre, and G. Neven. Security proofs for identitybased identification
and signature schemes. Proceedings of Eurocrypt. Springer-Verlag, 2004, 268-286.
Cao, X., W. Kou, L. Dang, and B. Zhao. IMBAS: Identity-based multi-user broadcast authenti-
cation in wireless sensor networks. Computer Communication (Elsevier) 31 (2008): 659-667.
Carbunar, B., Y. Yu, L. Shi, M. Pearce, and V. Vasudevan. Query privacy in wireless sensor
networks. Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2007, 203-212.
Gorantla, M. C., C. Boyd, and J. M. González Nieto. ID-based one pass authenticated key
establishment. Proceedings of the Sixth Australasian Conference on Information Security. 2008,
39-46.
Huang, Q., J. Cukier, H. Kobayashi, B. Liu, and J. Zhang. Fast Authenticated Key Establishment
Protocols for Organizing Sensor Networks. Workshop on Sensor Networks and Applications
(WSNA). ACM, 2003, 141-150.
Karlof, C., N. Sastry, and D. Wagner. TinySec: A link layer security architecture for wireless
sensor networks. Second ACM Conference on Embedded Networked Sensor Systems. ACM,
2004, 162-175.
Liu, D, and P. Ning. Efficient distribution of key chain commitments for broadcast authentica-
tion in distributed sensor networks. 10th Annual Network and Distributed System Security.
2003, 263-276.
Merkle, R. C. Protocols for Public Key Cryptosystems. Symposium on Security and Privacy.
IEEE, 1980, 122-134.
Mitzenmacher, M. Compressed bloom filters. Edited by ACM. Transactions on Networking 10,
no. 5 (2002).
Naccache, D., and J. Stern. Signing on a postcard. Proceedings of Financial Cryptography.
Springer-Verlag, 2000, 121-135.
Nyberg, K., and R. A. Rueppel. A new signature scheme based on the DSA giving message recov-
ery. 1st ACM Conference on Computer and Communications Security. ACM, 1993, 58-61.
Perrig, A., R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signing of mul-
ticast streams over lossy channels. Symposium on Security and Privacy. IEEE, 2000, 56-73.
Perrig, A., R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security protocols for sensor
networks. Edited by ACM. Proceedings of MobiCom. Rome, 2001, 189-199.
Ren, K., W. Lou, and Y. Zhang. Multi-user broadcast authentication in wireless sensor net-
works. Proceedings of Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2012,
223-232.
Schnorr, C. P. Efficient signature generation for smart card. Journal of Crytology 4, no. 3 (1991):
161-174.
Search WWH ::




Custom Search