Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design of authentication protocol for LR-WPAN using pre-authentication mechanism
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
ZigBee security using identity-based cryptography
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
ZigBee technology is designed to be used on applications that require low data rate, low-cost, low power consumption. However, the ZigBee networks are vulnerable to various attacks. In this paper, we have proposed an Identity-based authentication protocol for a ZigBee network structured to have multiple clusters consisting of one coordinator and many devices. Further more, we have designed a secure protocol used for exchanging public parameters between two clusters. Our proposal could realize secure, fast, low-cost and scalable authentication between any two nodes in a clustered ZigBee network.