期刊文献+

一种层次型无线传感器网络安全认证方案 被引量:2

Security and authentication scheme for hierarchical wireless sensor networks
下载PDF
导出
摘要 在阐述无线传感器网络及其安全问题的同时,重点对层次型无线传感器网络安全认证方案展开研究.先对无线传感器网络安全框架协议SPINS进行分析,指出其不足之处.为进一步提高网络安全性,借鉴网络安全技术(如IPSec,SET等)中综合采用对称密码技术和非对称密码技术的思想,将证书应用于传感器网络中.根据传感器节点低功耗的特点,对其证书结构进行重新设计,通过重构的证书实现了传感器节点的身份认证和数据源认证.理论分析和仿真实验结果表明,本方案与SPINS方案相比,虽然使网络性能有所降低,但使网络安全性能有很大提高,能够有效地解决层次型无线传感器网络安全认证问题. To research the hierarchical wireless sensor network and its security,the security frame protocol SPINS is first analyzed and its deficiency is pointed out.In order to further enhance network security,the scheme proposed uses the thought of the network security technology(for example IPSec,SET and so on) to synthetically adopt the symmetrical and asymmetrical cryptology techniques for reference,and applies the certificate to the sensor networks.Because of the low-powered property,the certificate structure of the sensor nodes needs to be redesigned.By means of the redesigned certificate,the scheme can perform identity and data origin authentication.Finally,a security and performance analysis is provided based on the theory and simulation experiments.The conclusion shows that the scheme greatly promotes the security but decreases the network performance in comparison with SPINS.It can effectively solve the secure problems for the hierarchical wireless sensor network.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第A01期243-248,共6页 Journal of Southeast University:Natural Science Edition
基金 国防预研基金资助项目(1120021210704)
关键词 无线传感器网络 安全方案 证书重构 SPINS协议 wireless sensor network security scheme certificate rebuilding SPINS protocol
  • 相关文献

参考文献7

  • 1Shi E, Perrig A. Designing secure sensor networks[J]. IEEE Wireless Communications, 2004, 11(6): 38-43.
  • 2Heinzelman W, Chandrakasan A, Balakrishnan H. Energy-Efficient communication protocol for wireless sensor networks[C]// IEEE Proceedings of the Hawaii International Conference System Sciences '00. Hawaii, 2000: 3005-3014.
  • 3Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Journal of Wireless Networks, 2002, 8(5):521-534.
  • 4Bohge M, Trappe W. An authentication framework for hierarchical Ad Hoc sensor networks[C]// Proceedings of ACM Workshop on Wireless Security(WISE'03). San Diego, CA, USA: ACM Press, 2003: 79-87.
  • 5曹水仁,龙华,刘云,冯思泉.基于椭圆曲线和RSA的数字签名的性能分析[J].现代电子技术,2006,29(17):29-31. 被引量:4
  • 6Zhu S, Satia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]//Proceedings of ACM Conf on Computing and Communication Security (CCS'2003). Washington, DC: ACM Press, 2003: 62-72.
  • 7Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures[C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications. Anchorage, AK, USA, 2003: 113- 127.

二级参考文献4

  • 1Lenstra A,Verheul E.Selecting Cryptographic Key Sizes.Journal of Cryptology[J].2001,14:255-293.
  • 2William Stallings.密码编码学与网络安全-原理与实践[M].北京:电子工业出版社,2001.
  • 3Johnson D,Menezes A,Vanstone S.The Elliptic Curve Digital Signature Algorithm(ECDSA)[J].International Journal of Information Security,2001,1:36-63.
  • 4Diffie W,Hellman M.New Direction in Cryptography[J].IEEE Transactions on Information Theory,1976,22:664-654.

共引文献3

同被引文献24

  • 1周贤伟,施德军,覃伯平.无线传感器网络认证机制的研究[J].计算机应用研究,2006,23(12):108-111. 被引量:6
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3蒋毅,史浩山.无线传感器网络中基于簇结构的公钥认证策略[J].传感技术学报,2007,20(6):1371-1375. 被引量:2
  • 4Perrig A,Canetti R,Tygar J D,et al. Efficient authentication and signature of multicast streams over lossy channels[C]//Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland, California, USA : [s. n. ], 2000 : 56-73.
  • 5Perrig A, Szewczyk R, Wen V, et al. SPINS : security protocols for sensor networks [J]. Wireless Networks, 2002 (8):521-534.
  • 6Liu D, Ning P, Zhu S, et al. Practical broadcast authentication in sensor networks[C]//MobiQuitous.[S. l. ] :IEEE Computer Society ,2005 : 118-132.
  • 7Tseng Huei Ru, Jail Rong Hong, Yang Wuu, et al. An improved dynamic user authentication scheme for wireless sensor networks [ C ]. In Proceedings of IEEE Global Telecommunication Confer- ence, 2007:986-990.
  • 8Das Manik Lal. Two-factor user authentication in wireless sensor networks[ J ]. IEEE Transactions on Wireless Communication, 2009,3 ( 8 ) : 1086-1090.
  • 9Nils Gura, Arun Patel, Arvinderpal Wander, et al. Comparing el- liptic curve cryptography and RSA on 8bit CPUs [ J ]. Proc of Workshop on Cryptography Hardware and Embedded System (CHES) ,2004, (8) :11-13.
  • 10Malan David J, Welsh Matt, Smith Michael D. Implementing pub- lic-key infrastructure for sensor networks [J] ACM Transactions on Sensor Networks, 2008,4 (4) : 1-23.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部