期刊文献+

一种高效的WSN节点身份的分布式认证研究 被引量:1

Research on an Efficient WSN Node Identity Distributed Authentication
下载PDF
导出
摘要 针对现有的基于地理位置信息的无线传感器网络节点身份认证方案存在的通信开销大、计算重复度大、节点位置信息暴露率高等问题,提出一种高效的节点身份认证方案.方案对网络部署区域进行局部目标区域划分,在目标区域内利用欧氏距离计算出与目标节点最短路径的该区域边界节点,该边界点的认证通过给目标区域授权第三方可信任的门限节点来实现.此外,考虑节点位置信息的安全性,给节点增设可更新的密码信息.在相同仿真参数设置下,改进方案与DBNA算法和IDNAS算法比较,网络通信开销降低75%,传感网络节点位置信息暴露率维持在5%左右. An efficient node authentication scheme was proposed, which was used to solve the problem of the communication over- head,the large repeat degree,node position information exposure rate highly ,those were brought by the exiting wireless sensor network node identity authentication scheme based on geographical location information. The network deployment area of the local target region was partied, combined with the Euclidean distance to compute the shortest path between the target region boundary node and a destina- tion node in the target region;the authorized third party trusted gate node for boundary node authentication was added. In addition, the password information of nodes was added, which improves the safety of node location information. Under the same simulation parame- ter, comparing the results of improved authentication algorithm with DBNA algorithm and IDNAS algorithm, the network communica- tion overhead is reduced by 75% ,location information of sensor network node exposure rate reduced to about 5%.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第11期2459-2463,共5页 Journal of Chinese Computer Systems
基金 江苏省产学研联合创新资金-前瞻性联合研究项目(BY2013015-33)资助
关键词 无线传感器网络 安全认证 节点认证 区域划分 位置信息 可信任第三方 wireless sensor network security authentication node authentication regional partition location information trusted third party
  • 相关文献

参考文献2

二级参考文献17

  • 1LIU D G, NING P, ZHU S, et al. Practical broadcast authentication in sensor networks[A]. Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services[C]. San Diego, California, USA, 2005.118-132. 被引量:1
  • 2PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534. 被引量:1
  • 3LIU D G, NING E Multilevel uTESLA: broadcast authentication for distributed sensor networks[J]. ACM Transaction in Embedded Computing Systems, 2004, 3(4): 800-836. 被引量:1
  • 4HU Y, PERRIG A, JOHNSON D.Packet leashes: a defense against wormhole attacks in wireless ad hoc networks[A]. Proceedings of the 22th Annual Joint Conference of the IEEE Computer and Communications Societies[C]. San Francisco, CA, USA, 2003.1976-1986. 被引量:1
  • 5WANDER A, GURA N, EBERLE H, et al. Energy analysis of public key cryptography on small wireless devices[A]. IEEE International Conference on Pervasive Computing and Communications[C]. Kauai, Hawaii, 2005.324-328. 被引量:1
  • 6DU W, WANG R, NING E An efficient scheme for authenticating public keys in sensor networks[A]. Proceedings of the 6th ACM In- ternational Symposium on Mobile Ad Hoc Networking and Computing[C]. New York, NY, USA, 2005.58-67. 被引量:1
  • 7DRIESSEN B, POSCHMANN A, PAAR C. Comparison of innovative signature algorithms for WSNs[A]. Proceedings of the 1st ACM Conference on Wireless Network Security[C]. Alexandria, VA,USA, 2008.30-35. 被引量:1
  • 8PIOTROWSKI K, LANGENDORFER P, PETER S. How public key cryptography influences wireless sensor node lifetime[A].Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Alexandria, Virginia, USA, 2006.169-176. 被引量:1
  • 9LIU A, NING E TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks[A]. Proceedings of the 7th International Conference on Information Processing in Sensor Networks[C]. Saint Louis, Missouri, USA, 2008.245-256. 被引量:1
  • 10OLIVEIRA L B, DAHAB R, LOPEZ J, et al. Identity-based encryption for sensor networks[A]. Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops[C]. White Plains, NY, 2007.290-294. 被引量:1

共引文献5

同被引文献24

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部