期刊文献+

基于P-ECC和同余方程的分簇WSN节点身份认证机制 被引量:2

Node identity authentication scheme for clustered WSNs based on P-ECC and congruence equation
下载PDF
导出
摘要 针对新节点加入的传感器网络中进行合法的身份认证带来的节点内存占有量大、计算量大、秘密值的信息安全度低等问题,提出一种适用于内存有限的传感网络,安全度高的节点身份认证机制。该方案采用增添节点自身密码,并采用单向哈希函数对密码和身份(ID)进行散列化,利用密码参与椭圆曲线的签名算法的生成,可信节点间采用同余方程的认证方案,且各认证阶段均采用互认证模式。该方案不仅能防范窃听、重放、注入等攻击,而且能抵御猜测攻击、中介攻击、匿名信息攻击和拒绝服务攻击。与现有算法相比,所提方案能减少节点最初内存占有量三个单位级别,减少密钥检测率。 Concerning the problems of large node memory occupation, complex calculation, low information safety degree, in the legal identity authentication when new node joins in sensor networks, a node authentication mechanism of highly safety degree applicable to the limited memory network was proposed. The mechanism used the password to add the node itself, and one-way Hash function was applied to the password and IDentity (ID) for hashing. Password was involved in the generation of the elliptic curve signature algorithm and authentication scheme of congruence equation was adopted between credible nodes. Each certification stage used mutual authentication mode. The proposed algorithm not only can prevent eavesdropping, replay, injection and so on, but also is able to resist guessing attack, mediation attack, anonymous attack and denial of service attack. The comparison with the existing algorithms show that the proposed scheme can reduce the node original memory occupation of three unit level and can reduce key detection rate.
出处 《计算机应用》 CSCD 北大核心 2014年第1期104-107,共4页 journal of Computer Applications
基金 江苏省产学研联合创新资金资助项目(BY2013015-33)
关键词 无线传感器网络 安全认证 节点认证 同余方程 椭圆曲线加密 Wireless Sensor Network (WSN) safety certification node authentication congruence equation Ellipse Curve Cryptography (ECC)
  • 相关文献

参考文献16

二级参考文献57

  • 1肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 2AKYILDIZ F, SU W, SANKARASUBRAMANIAM Y. et al. A survey on sensor networks[ J]. IEEE Communications Magazine, 2002, 40(8) : 102 - 114. 被引量:1
  • 3NEUMAN B C, TSO T. Kerberos: An anthentication service for computer networks[ J]. IEEE Communications Magazine, 1994, 32 (9) : 33 - 38. 被引量:1
  • 4CAMTEPE S A, YENER B. Key distribution mechanisms for wireless sensor networks: A survey TR-05-07[ R]. Troy. NY: Rensselaer Polytechnic Institute, 2005. 被引量:1
  • 5ESCHENAUER L, GLIGOR V. A key management scheme for distributed sensor networks[ C]// Proceedings of the 9th ACM Conference on Computer and Communication Security. Washington, DC: ACM Press, 2002:41 -47. 被引量:1
  • 6CHAN H, PERRIG A, SONG D. Random Key Pre-distribution schemes for sensor networks[ C]// IEEE Symposium on Research in Security and Privacy. Berkeley. California: IEEE Computer Society, 2003:197 -213. 被引量:1
  • 7DU W, DENG J, HAN Y S, et al. A pairwise key pre-distribution for wireless sensor networks[ C]// Proceeding of the 10th ACM Conference on Computer and Communications Security (CCS). New York, NY: ACM Press, 2003:42-51. 被引量:1
  • 8CHEN JIANG-WEI, XU LI, MU YI. A new group rekeying scheme based on t-packing designs for Ad Hoe networks[ C]// Proceedingsof the 2nd International Conference on Scalable lnformation Systems. New York, NY: ACM Press, 2007: 110- 115. 被引量:1
  • 9ZHU S, XU S, SETIA S, et al. Establishing pairwise keys for secure communication in Ad Hoc networks: A probabilistic approach [ C]//Proceeding of the 11 th IEEE International Conference on Network Protocols: ICNP'03. Washington, DC: IEEE Computer Society, 2003:326-335. 被引量:1
  • 10PIETRO R D, MANCINI L V, MEI A. Efficient and resilient key discovery based on pseudo-random key pre-deployment[ C]// Proceedings of the 18th International Parallel and Distributed Processing Symposium: IPDPS'04. California: IEEE Computer Society, 2004: 26 - 30. 被引量:1

共引文献13

同被引文献38

  • 1Vaidya B, Makrakis D, Mouftah H T. Improved two-factor user authentication in wireless sensor networks. Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications(WiMob), Shenzhen, China, 2010:600-606. 被引量:1
  • 2Mnif A, Cheikhrouhou O, Jemaa M B. An ID-based user authentication scheme for wireless sensor networks using ECC. Proceedings of 2011 International Conference on Microelectronics (ICM), Nanjing, China, 2011:1-9. 被引量:1
  • 3Huang X, Dharmendra S, Cui H Y. Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks. Proceedings of the International Conference on Information Networking 2014 (ICOIN2014), Xiamen, China, 2014:312-317. 被引量:1
  • 4Faye Y, Guyennet H, Niang I, et ol. Fast scalar multiplication on elliptic curve cryptography in selected intervals suitable for wireless sensor networks. Lecture Notes in Computer Science, 2013(1):171-182. 被引量:1
  • 5Xue K, Ma C, Hong P, eta/. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network & Computer App|ications, 2013, 36(1):316-323. 被引量:1
  • 6Pippal R S, Gupta P, Singh R. A novel smart card authentication scheme using image encryption. International Journal of Computer Applications, 2013, 72(9):8-14. 被引量:1
  • 7Wei J H, Liu W F, Hu X X. Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 2014, 77 (3): 2255 -2269. 被引量:1
  • 8Li X, Niu J W, Kumari S, et ol. An enhancement of a smart card authentication scheme for muhi-server architecture. Wireless Personal Communications, 2015, 80(1):175-192. 被引量:1
  • 9陈立全,刘海东.基于身份签名的P2P语音认证及密钥协商方法[J].东南大学学报(自然科学版),2011,41(6):1152-1157. 被引量:3
  • 10汪定,马春光,翁臣,贾春福.一种适于受限资源环境的远程用户认证方案的分析与改进[J].电子与信息学报,2012,34(10):2520-2526. 被引量:14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部