期刊文献+

基于身份的ZigBee节点认证方案 被引量:5

Identity-based authentication scheme for ZigBee nodes
下载PDF
导出
摘要 深入研究ZigBee规范及目前各种基于身份的认证方案,针对ZigBee节点组网时缺乏身份认证的问题,提出一种利用椭圆曲线上的双线性对运算实现的ZigBee节点认证方案,方案在实现节点之间双向身份认证的同时还能够正确建立共享的链接密钥。实验结果表明,该方案继承了基于身份的认证方案的优点,具有较高的安全性和可扩展性,同时方案还保持了较小的资源开销。 ZigBee specifications and kinds of identity-based authentication schemes are researched in-depth. Aiming at solving the issues of lack of identity authentication when nodes compose a ZigBee network, an identity-based ZigBee identity authentication scheme using weil pairing on ellipse curve is proposed. Based on the scheme, the implementation of mutual identity authentication is simultaneous with the establishment of ZigBee link key between ZigBee nodes. Experiments show that the proposed scheme bears the advantage of identity-based authentication scheme and has high security and extensibility. Besides, the scheme has the advantage of limited resource cost.
作者 杨同豪 郁滨
出处 《计算机工程与设计》 CSCD 北大核心 2012年第11期4127-4130,共4页 Computer Engineering and Design
关键词 ZIGBEE网络 基于身份的密码体制 椭圆曲线 双线性对 双向身份认证 ZigBee network identity-based cryptography ellipse curve weil pairing mutual identity authentication
  • 相关文献

参考文献11

  • 1ZigBee Alliance. ZigBee specifications [EB/OL]. http: // www. zigbee. org, 2007. 被引量:1
  • 2Yuksel E, Nielson H R, Nielson F. ZigBee-2007 security es sentials [C]. Copenhagen: Proceedings of the 13th Nordic Workshop on Secure IT Systems, 2008: 65-82. 被引量:1
  • 3Shieh Ji-Tsong, Ko Li-chun. Implementation of a broadcast authentication mechanism in ZigBee [C]. Taiwan: Proceedings of the 2nd Workshop on Wireless, Ad Hoc, and Sensor Networks (WASN), 2006: 1-8. 被引量:1
  • 4Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, et al. An en hanced trust center based authentication in ZigBee networks [C]. Lecture Notes in Computer Science 5576.. Seoul: Advances in Information Security and Assurance, 2009:471-484. 被引量:1
  • 5Pereira R. ZigBee and ECC secure wireless networks [EB/ OL]. http: //www. elecdesign. com, 2008. 被引量:1
  • 6William Stallings. Cryptography and network security.- Principles and practice [M]. 4th ed. New Jersey: Prentice Hall, 2006: 225. 被引量:1
  • 7Blaser M. Industrial-strength security for ZigBee: The case for public-key cryptography [J]. Embedded Computing Design, 2005 (9): 48-52. 被引量:1
  • 8Oliveira L B, Dahab R, Lopez J, et al, Identity-based encryption for sensor networks [C]. New York: Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007: 290-294. 被引量:1
  • 9杨庚,余晓捷,王江涛,程宏兵.基于IBE算法的无线传感器网络加密方法研究[J].南京邮电大学学报(自然科学版),2007,27(4):1-7. 被引量:8
  • 10Texas Instruments. CC2530_ datasheet [EB/OL]. http: // www. ti. com, 2010. 被引量:1

二级参考文献20

  • 1AKYILDIZ I F.Wireless sensor networks:A survey[J].Computer Networks,2002,38(4):393-422. 被引量:1
  • 2LIU D,NING P,LI R.Establishing pairwise keys in distributed sensor networks[J].ACM Trans on Information and System Security,2005,8(1):41-47. 被引量:1
  • 3DU W,DENG J,HAN Y S,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Trans on Information and System Security,2005,8(2):228-258. 被引量:1
  • 4ANDERSON R,KUHN M.Tamper resistance-A cautionary note[C]//Proceedings of the 2nd Usenix Workshop on Electronic Commerce.1996:1-11. 被引量:1
  • 5ESCHENAUER L,GLIGOR V D.A key-management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington,DC,USA,2002:41-47. 被引量:1
  • 6LIU D,NING P.Multi-level μ TESLA:Broadcast authentication for distributed sensor networks[J].ACM Trans on Embedded Computing Systems,2004,3(4):800-836. 被引量:1
  • 7PIETRO R D,MANCINI L V,ANDMEI A.Random key assignment for secure wireless sensor networks[C]//ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03).Fairfax,Virgina,2003:62-71. 被引量:1
  • 8CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//IEEE Symposium on Research in Security and Privacy.Berkeley,CA,USA,2003:197-213. 被引量:1
  • 9LIU D,NING P.Location-based pairwise key establishments for static sensor networks[C]//ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03).Fairfax,Virgina,USA,2003:72-82. 被引量:1
  • 10GANESAN P,ENUGOPALAN R,PEDDABACHAGARI P,et al.Analyzing and modeling encryption overhead for sensor network nodes[C]//Proceedings of the 1st ACM internationalworkshop on wireless sensor networks and applications.San Diego,California,USA,2003. 被引量:1

共引文献7

同被引文献46

引证文献5

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部