期刊文献+

无线传感器网络节点间认证及密钥协商协议 被引量:12

Authentication and Key Negotiation Protocol Between Two Nodes of Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络的特性使它面临着比传统无线网络更大的安全挑战,其安全解决方案必须兼顾安全性和系统性能等因素。节点间认证及密钥协商是构建安全网络最基本的协议,是密钥管理协议和安全路由协议等的实现基础。很明显,包括传统Adhoc在内的各种无线网络领域中的安全认证及密钥协商机制都无法适用于无线传感器网络。为此,在充分考虑无线网络攻击方法和无线传感器网络自身特点的基础上,结合基于ID的公钥密码技术,提出了椭圆曲线双线性对上的无线传感器网络节点安全认证及密钥协商协议。分析发现,该协议不仅满足安全性要求,同时,能够适合无线传感器网络的特殊应用要求。 Due to their own characteristics, wireless sensor networks are facing more security challenges than traditional networks. Their security mechanism should take into account both the security and the system performance. Authentication and key negotiation is an elementary protocol in constructing a secure network system, and it is the implementation foundation of the key management protocol and the secure routing protocol. By all appearances, most of the existing wireless networks authentication and key negotiation protocols are inapplicable to wireless sensor networks, including those in traditional Ad hoc networks. Motivated by these concerns, on the enough consideration on the attack methods for wireless networks and the characteristics of wireless sensor networks, a node-to-node authentication and key negotiation protocol is proposed, in which the ID-based public-key cryptography and the ellipse curve bilinear pair are adopted. Analyses show that this protocol can be used to guarantee the security of wireless sensor networks, and at the same time, it can meet the special application requirements of wireless sensor networks
出处 《传感技术学报》 CAS CSCD 北大核心 2008年第8期1422-1426,共5页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目资助(60672112 60473027) 陕西省自然科学基金项目资助(2007F37) 中国博士后科学基金资助(20070410376) 广西区教育厅基金资助课题(ZT5800) 高等学校学科创新引智计划资助(B08038)
关键词 无线传感器网络 安全认证 密钥协商 椭圆曲线 wireless sensor networks authentication key negotiation ellipse curve
  • 相关文献

参考文献14

  • 1覃伯平,周贤伟,杨军,李晓勤.基于无线传感器网络路由协议的安全机制研究[J].传感技术学报,2006,19(4):1276-1278. 被引量:15
  • 2覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 3温蜜,陈克非,郑燕飞,李晖.传感器网络中一种可靠的对密钥更新方案(英文)[J].软件学报,2007,18(5):1232-1245. 被引量:10
  • 4苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 5IEEE P802. 11i, Draft Supplement to Standard for Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements - Part 11 : Wireless Medium Access Control (MAC) and physical layer (PHY) specifications : Specification for Operation in Additional Regulatory Domains[S].
  • 6GB15629.11-2003/XG1-2006,信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单[S].中国标准出版社,2006年.
  • 7IEEE 802. 16e-2005. IEEE Standard for Local and metropoli tan for Fixed Broadband Wireless Access Systems: Amend ment 2: Physical and Medium Access Control Layers for Com bined Fixed and Mobile Operation in Licensed Bands[S].
  • 8庞辽军,黄振海,郭宏等.一种增强无线城域网安全性的方法[P].专利号:ZL200410073156.9,授权公告日:2006年6月.
  • 9Stephan O, xu Qingwen. Information Assurance In Wireless Sensor Networks[C]//Proceedings of the 19th IEEE interna- tional Parallel and Distributed Processing Symposium, IPDPS' 05, 2005.
  • 10Shamir A. Identity-Based Cryptosystems and Signature Schemes[J]. Advances in Cryptology, Crypto'84, LNCS 196, Springer-Verlag, 47-53. 1984.

二级参考文献58

  • 1Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless Sensor Networks:a Survey[J].Computer Networks,2002,38(4):393-422.
  • 2Krishnamachari B.Impact of Data Aggregation in Wireless Sensor Networks[C].In:Proceeding of the International Workshop of Distributed Event Based Systems,Los Alamitos:IEEE Computer Press,2002:1-11.
  • 3Chan Haowen,Perrig A.Security and Privacy in Sensor Networks[J].Computer,2003,36(10):103-105.
  • 4Hedetniemi S,Liestman A.A Survey of Gossiping and Broadcasting in Communication Networks[J].Networks,1998,18(4):319-349.
  • 5Intanagonwiwat C,Govindan R,Estrin D.Directed Diffusion:A Scalable and Robust Communication Paradigm for Sensor Networks[C].In:Proceedings of the ACM MobiCom'00,Boston,MA,2000:56-67.
  • 6Heinzelman W R,Chandrakasan A,Balakrishnan H.An Application-Specific Protocol Architecture for Wireless Microsensor Networks[J].IEEE Transactions on Wireless Communications,October 2002,1(4):660-670.
  • 7Brad K,Kung H T.GPSR:Greedy Perimeter Stateless Routing for Wireless Networks[C].In:Proc.ACM MOBICOM,Auguest 2000:243-254.
  • 8JiangQiangfeng,Manivannan D.Routing Protocols for Sensor Networks[C].In:Consumer Communications and Networking Conference,January 2004:93-98.
  • 9Karlof C,Wagner D,Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J]..Ad Hoc Networks,2003(1):293-315.
  • 10Douceur J R.The Sybil attack[C].In:First International Workshop on Peer-to-Peer Systems (IPTPS '02),2002.

共引文献173

同被引文献122

引证文献12

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部