期刊文献+

自认证公钥的无线传感器网络密钥协商协议 被引量:7

Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System
下载PDF
导出
摘要 自认证公钥密码不需要证书管理,不存在密钥托管问题,非常适用于资源受限的无线传感器网络.但现有的自认证公钥传感网密钥协商协议存在安全性低和能量消耗大的缺点.首先分析并指出Yoon等人提出的协议不能抵抗密钥泄漏伪装攻击;然后采用MTI协议族的"隐式认证"的思想,基于椭圆曲线Diffie-Hellman假设,设计了一个新的基于自认证公钥体制的认证密钥协商协议WSN-AKA.该协议是第1个可证明安全的传感器网络自认证公钥体制密钥协商协议.与现有协议相比,该协议不仅安全性更高,而且因其密钥协商只需两次消息传递,其通信效率也最高而能耗最少. Wireless sensor networks use small nodes with and disseminate information in many types of applications constrained capabilities to sense, collect, As sensor networks become wide-spread, security issues become a central concern. The design of key agreement protocols, whose main objective is to provide secure and reliable communication, is one of the most important aspects and basic research field of secure wireless sensor networks. Self-certified public key system, which does not require certification management and has no key escrow problem, is ideal for resource-constrained wireless sensor networks. However, the existing sensor network with key agreement protocols based on self-certified public cryptography is low security and great energy consumption. First of all, after the protocol proposed by Yoon et al is analyzed, it is pointed out that the protocol can not resist the key compromise impersonation attack. Then the idea of the implicit authentication in the MTI protocol families is adopted to devise a new authenticated key agreement protocol for wireless sensor networks using self-certified public key. To our knowledge, the proposed scheme is the first provably secure key agreement protocol for wireless sensor networks based on self-certified public key system. The scheme not only provides greater security, but is the most efficient communication and requires less energy compared with the existing relevant protocols , because of only two-pass message exchanges.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第2期304-311,共8页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2006AA706103) 江苏高校优势学科建设工程资助项目 南航基本科研业务费专项科研基金项目(NS2010107)
关键词 传感器网络 自认证公钥 椭圆曲线密码 可证安全 认证密钥协商 wireless sensor networks self-certified public key elliptic curve cryptography provable security authenticated key agreement
  • 相关文献

参考文献15

  • 1Chen Xiangqian, Kia Makki, Kang Yen, et al. Sensor network security: A survey [J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73. 被引量:1
  • 2Zhou Yun, Fang Yuguang, Zhang Yanchao. Securing wireless sensor networks : A survey [J]. IEEE Communications Surveys, 2008, 10(3) : 6-28. 被引量:1
  • 3Watro R, Kong Derrick, Cuti S, et al. TinyPK: Securing sensor networks with public key technology [C] //Proc of the 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04). New york: ACM, 2004:156-163. 被引量:1
  • 4Gura N, Patel A, Wander A, et al. Comparing elliptic curve cryptography and RSA on 8-Bit CPUs [G]//LNCS 3156. Berlin: Springer, 2004:119-132. 被引量:1
  • 5Liu An, Ning Peng. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks [C] //Proc of the 2008 Int Conf on Information Processing in Sensor Networks. Los Alamitos, CA: IEEE Computer Society, 2008:245-256. 被引量:1
  • 6Zhang Y C, Liu W, Lou W J, et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks [J]. IEEE Journal on Selected Areas in Communications, 9:006, 24(2): 247-260. 被引量:1
  • 7杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 8Piotr S, Martin C. Practical identity-based key agreement for secure communications in sensor networks [C] //Proc of 18th Int Conf on Computer Communications and Networks. Los Alamitos, CA: IEEE Computer Society, 2009:1-6. 被引量:1
  • 9Huang Q, Cukier J, Kobayashi H, et al. Fast authenticated key establishment protocols for self-organizing sensor networks [C]//Proc of the 2nd ACM Int Conf on Wireless Sensor Networks and Applications. New York.. ACM, 2003:141-150. 被引量:1
  • 10Panayiotis K, Magkos E, Christos D, et al. Hybrid key establishment for multiphase self-organized sensor networks [C] //Proc of the 6th IEEE Int Syrup on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05). Los Alamitos, CA: IEEE Computer Society, 2005:1-7. 被引量:1

二级参考文献19

  • 1Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77. 被引量:1
  • 2Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258. 被引量:1
  • 3Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11. 被引量:1
  • 4Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47. 被引量:1
  • 5Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71. 被引量:1
  • 6Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213. 被引量:1
  • 7Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13. 被引量:1
  • 8Liu D,Ning P.Multi-level μTESLA:broadcast authentication for distributed sensor networks[J].ACM Transactions in Embedded Computing Systems (TECS),2004,3(4):800-836. 被引量:1
  • 9Shamir A.Identity-based cryptography and signature schemes[A].Advances in Cryptology,CRYPTO'84,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1985,196:47-53. 被引量:1
  • 10Boneh D,Franklin M.Identity-based encryption from the Weil pairing[A].Advances in Cryptology,CRYPTO 2001,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,2001.2139.213-229. 被引量:1

共引文献59

同被引文献50

  • 1魏春英,郭中华.基于双线性映射的三因子远程身份认证协议研究[J].计算机应用研究,2020,37(1):221-224. 被引量:3
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 5Gomez C,Paradells J.Wireless home automation networks:a survey of architectures and technologies[J].Consumer communications and networking,2010 (6):92-10. 被引量:1
  • 6Verma V K,Singh S,Nagendra P.Pathak.Analysis of schability for AODV routing protocol in wireless sensor networks.International Journal for Light and Electron Optics[J].2014,125 (2):748-750. 被引量:1
  • 7Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].CCS'02:Proceedings of the 9th ACM Conference on Computer and Communications Security[C].New York:ACM,2002:18-22. 被引量:1
  • 8Chan H,Perrlg A,Song D.Random key-predistribution schemes for sensor networks[A].SP'03:Proceedings of the 2003 IEEE Symposium on Security and Privacy[C].Washington,DC:IEEE Computer Society,2003:197 213. 被引量:1
  • 9Przydatek B,Song D,Perrlg A.SIA..Secure information aggregation in sensor networks[A].SenSys'03:Proceedings of the1st International Conference on Embedded Networked Sensor Systems[C].New York:ACM,2003:255-265. 被引量:1
  • 10AQEEL K, KULDIP S, SANDEEP S. Implementation of el- liptic curve digital signature algorithm [ J ]. International journal of computer applications,2010,1 ( 2 ) : 21-27. 被引量:1

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部