期刊文献+

网络中基于单向函数密钥链的广播认证协议

Survey of broadcast authentication protocols based on one-way key chain in sensor networks
下载PDF
导出
摘要 无线传感器网络中的广播认证技术能够保护广播报文不被恶意篡改或伪造,对于战场侦察、森林火险监测等应用具有重要的意义。现有的广播认证协议中基于单向函数密钥链的协议以较高的认证效率得到了研究工作者的普遍认可,对现有的这些认证协议进行了介绍和分析,并提出了可能的进一步研究方向。 Authentication of broadcast messages in sensor networks was a very important mechanism to ensure that data from a valid source was not altered in transmits, especially for applications such as battlefield surveillance and forest fire detection. In all broadcast authentication protecols, protocols based on one-way key chain were more efficient and accepted by researchers. A survey about those protocols was given and a probable future work was pointed out.
作者 王晓东 赵鑫
出处 《计算机应用》 CSCD 北大核心 2008年第B06期52-54,共3页 journal of Computer Applications
基金 国家973计划项目(2006CB303000)
关键词 广播认证 单向函数密钥链 数字签名 无线传感器网络 broadcast authentication one-way key chain digital signature wireless sensor network
  • 相关文献

参考文献8

  • 1PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: Security protocols for sensor networks [J]. Wireless Networks, 2002, 8 (5): 521 - 534.
  • 2REN KUI, LOU WEN-JING, ZHANG YAN-CHAO. Multi-user broadcast authentication in wireless sensor networks[ C]//Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (1EEE SECON 2007). Washington: IEEE Computer Society, 2007:223 -232.
  • 3LIU DONG-GANG, NING PENG, ZHU SEN-CUN, et al. Practical broadcast authentication in sensor networks[ C]//Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. Washington: IEEE Computer Society, 2005:118 -132.
  • 4PERRIG A, CANETTI R, SONG D, et al. Efficient and secure source authentication for multicast[ C]//Proceedings of the Network and Distributed System Security Symposium (NDSS'01). San Diego, CA: The Intemet Society, 2001:35 -46.
  • 5ZHU S, SETIA S, JAJODIA S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[ C]// Proceedings of the 10th ACM conference on Computer and Communications Security (CCS'03). New York: ACM Press, 2003:62-72.
  • 6LUK M, PERRIG A, WHILLOCK B. Seven cardinal properties of sensor network broadcast authentication[ C]//Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2006:147 - 156.
  • 7SUN K, NING P, WANG C. TinySeRSync: Secure and resilient time synchronization in wireless sensor networks[ C]// Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06). New York: ACM Press, 2006:264-277.
  • 8PIOTROWSKI K, LANGENDOERFER P, PETER S. How public key cryptography influences wireless sensor node lifetime[ C]//Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks ( SASN 2007). New York: ACM Press, 2007:169 - 176.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部