期刊文献+

基于Merkle散列树的无线传感器网络实体认证协议 被引量:5

Clustering-Based Merkle Hash Tree Entity Authentication Scheme for Wireless Sensor Network
下载PDF
导出
摘要 针对无线传感器网络节点能量、计算和存储有限的特点,以及公开密钥算法和数字签名实施认证耗能多的不足,提出一种适用于无线传感器网络的基于分簇的Merkle散列树实体认证协议(CMAS).该协议利用Merkle散列树的思想,可获得有效的安全认证策略;结合网络分簇技术,使得协议更实用;并且只使用对称密钥算法,避免了采用公开密钥算法实施数字签名计算量大的问题,有效地降低了认证的时延、增大网络生存期和提高了安全性.仿真实验证明该协议的有效性. Wireless sensor network is characteristic of limited energy, computation and memory. Public key algorithm and digital signature consume high energy. A novel entity authentication scheme based on Merkle hash tree for Clustering-Based sensor network (CMAS) is proposed to solve such problems. This method using the concept of Merkle hash tree may obtain an effective safe authentication strategy. Combining the network clustering technology, this scheme has more practical use in large-scale network. Moreover, symmetrical key algorithm is used to avoid large computation, which effectively reduces the authentication delay, increases the network lifetime and enhances the security of the network. Simulation results show that the scheme is valid.
出处 《传感技术学报》 CAS CSCD 北大核心 2007年第6期1338-1343,共6页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目资助(60573050) 北京邮电大学泛网无线通信教育部重点实验室开放课题(2007104)
关键词 无线传感器网络 网络安全 实体认证 wireless sensor network , network security, entity authentication
  • 相关文献

参考文献11

  • 1Perrig A,Szewczyk R,Wen V,Culler D,und Tygar J.D.Spins:Security Protocols for Sensor Networks[C]//Proceedings of the 7th annual international conference on Mobile computing and networking.ACM Press.2001.189-199. 被引量:1
  • 2Chris Karlof,David Wagner.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C]// IEEE International Workshop on Sensor Network Protocols and Applications,May 2003:113-127. 被引量:1
  • 3Watro R,Kong D,fen Cuti S,Gardiner C,Lynn C,and Kruus P.TinyPK:Securing Sensor Networks with Public Key Technology[C]//Proceedings of the 2nd ACM Workshop on Security of ad Hoc and Sensor Networks,ACM Press,2004.59-64. 被引量:1
  • 4Zinaida Benenson,Nils Gedicke,Ossi Raivio.Realizing Robust User Authentication in Sensor Networks[C]//Workshop on Real-World Wireless Sensor Networks (REALWSN),June 2005.135-142. 被引量:1
  • 5Bauer K and Lee Hyunyoung A.Distributed Authentication Scheme For A Wireless Sensing System[C]//Proceedings of 2nd International Workshop on Networked Sensing Systems (INSS 2005),June 2005.210-215. 被引量:1
  • 6Deng J,Han R and Mishra S.Enhancing Base Station Security in Wireless Sensor Networks[R].Technical Report CU-CS-951-03,Department of Computer Science,University of Colorado,2003. 被引量:1
  • 7Zhou T and Chakrabarty K.Authentication of Sensor Network Flooding Based on Neighborhood Cooperation[C]// Proc.IEEE Wireless Communications and Networking Conference,2006. 被引量:1
  • 8Heinzelman W R,Chandrakasan A,Balakrishnan H.An Application-Specific Protocol Architecture for Wireless Microsensor Networks[J].IEEE Transactions on Wireless Communications,2002,1 (4):660-670. 被引量:1
  • 9Tarek Sheltami.Efficient Routing Schemes for Wireless Mobile Ad hoc Networks[M].Queen's University Kingston,Ontario,Canada,April 2003. 被引量:1
  • 10Hu Wen,Chou Chun-tung,Jha Sanjay,et al.Deploying Long-Lived and Cost-Effective Hybrid Sensor Networks[C]//Proceedings of the First Workshop on Broadhand Advanced Sensor Networks,Base Nets 2004,San Jose,CA,2004. 被引量:1

同被引文献35

  • 1Yu Haifeng,Kaminsky M,Gibbons P B.SybilGuard:Defending Against Sybil Attacks via Social Networks[C]//Proceodings of SIGCOMM'06.Pisa,Italy:[s.n.],2006. 被引量:1
  • 2Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications.[S.l.]:ACM Press,2003. 被引量:1
  • 3Newsome J,Shi R,Song D,et al.The Sybil Attack in Sensor Networks:Analysis & Defenses[C]//Proceodings of the 3rd International Symposium on Information Processing in Sensor Networks.Berkeley,California,USA:ACM Press,2004. 被引量:1
  • 4Eschenauer L,Gligor V D.A Key-management Scheme for Distibuted Sensor Networks[C]//Proc.of the 9th ACM Conf.on Computer and Communication Security.Washingtion D.C.,USA:[s.n.],2002. 被引量:1
  • 5Zhang Qinghua,Wang Pan,Douglas S,et al.Defending Against Sybil Attacks in Sensor Networks[C]//Proceedings of the 25th IEEE International Conf.on Distributed Computing Systems Workshops.Washington D.C.,USA:IEEE Computer Society,2005. 被引量:1
  • 6Seog Chung Seo,Hyung Chan Kim,Ramakrishna R S.A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks[J].Lecture Notes in Computer Science,2006,4097:291-301. 被引量:1
  • 7An Liu,Peng Ning.TinyECC:A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks[C]//Proceedings of the 7th International Conference on Information Processing in Sensor Networks,2008:245-256. 被引量:1
  • 8Don B Johnson,Alfred J Menezes,Scott Vanstone.Elliptic Curve Digital Signature Algorithm[Z/OL].http://www.certicom.com/resources/download/ecdsa.ps. 被引量:1
  • 9Jung Hee Cheon,Dong Hoon Lee.Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations[J].IEEE Transactions on Computers,2006,55 (12):1536-1542. 被引量:1
  • 10Daniel J.Bernstein,Tanja Lange.Inverted Edwards Coordinates[C]//17th Applied Algebra,Algebraic Algorithms,and Error Correcting Codes Symposium,2007. 被引量:1

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部