期刊文献+

WSN中基于身份的高效多播认证协议 被引量:6

Efficient ID-based multicast authentication protocol in wireless sensor networks
下载PDF
导出
摘要 分析了无线传感器网络中已有多播认证协议的不足,给出了基于PKC的WSN安全协议研究进展,并提出一种基于身份的高效多播认证协议。该协议具有消息恢复功能,可有效缩短签名长度,减少协议的通信和计算开销,克服公钥密码体制开销大的缺点。在随机预言模型下证明了协议在适应性选择消息攻击和身份攻击下是存在性不可伪造的。最后,基于MICA2DOT无线传感器网络节点对协议的能量消耗进行了定量分析,结果表明,本协议的性能优于HESS、Zhang和BLS等协议,能更好地适用于资源受限的WSN环境。 In order to overcome the drawback of the existent multicast authentication protocol in WSN, the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented. The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computational cost and communication overhead of the protocol had been reduced greatly. This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model. The performance analysis results show that the proposed scheme can effectively reduce resource cost, adapt the characteristics of WSN and is clearly superior to the HESS, Zhang and BLS protocols.
出处 《通信学报》 EI CSCD 北大核心 2009年第6期64-69,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60602061) 国家高技术研究发展计划(“863计划”)基金资助项目(2006AA01Z413)~~
关键词 无线传感器网络 多播认证协议 PKC Co-DH群对 wireless sensor networks multicast authentication protocol PKC Co-DH group pair
  • 相关文献

参考文献17

  • 1LIU D G, NING P, ZHU S, et al. Practical broadcast authentication in sensor networks[A]. Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services[C]. San Diego, California, USA, 2005.118-132.
  • 2PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534.
  • 3LIU D G, NING E Multilevel uTESLA: broadcast authentication for distributed sensor networks[J]. ACM Transaction in Embedded Computing Systems, 2004, 3(4): 800-836.
  • 4HU Y, PERRIG A, JOHNSON D.Packet leashes: a defense against wormhole attacks in wireless ad hoc networks[A]. Proceedings of the 22th Annual Joint Conference of the IEEE Computer and Communications Societies[C]. San Francisco, CA, USA, 2003.1976-1986.
  • 5WANDER A, GURA N, EBERLE H, et al. Energy analysis of public key cryptography on small wireless devices[A]. IEEE International Conference on Pervasive Computing and Communications[C]. Kauai, Hawaii, 2005.324-328.
  • 6DU W, WANG R, NING E An efficient scheme for authenticating public keys in sensor networks[A]. Proceedings of the 6th ACM In- ternational Symposium on Mobile Ad Hoc Networking and Computing[C]. New York, NY, USA, 2005.58-67.
  • 7DRIESSEN B, POSCHMANN A, PAAR C. Comparison of innovative signature algorithms for WSNs[A]. Proceedings of the 1st ACM Conference on Wireless Network Security[C]. Alexandria, VA,USA, 2008.30-35.
  • 8PIOTROWSKI K, LANGENDORFER P, PETER S. How public key cryptography influences wireless sensor node lifetime[A].Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Alexandria, Virginia, USA, 2006.169-176.
  • 9LIU A, NING E TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks[A]. Proceedings of the 7th International Conference on Information Processing in Sensor Networks[C]. Saint Louis, Missouri, USA, 2008.245-256.
  • 10OLIVEIRA L B, DAHAB R, LOPEZ J, et al. Identity-based encryption for sensor networks[A]. Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops[C]. White Plains, NY, 2007.290-294.

同被引文献56

  • 1刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理[J].计算机学报,2006,29(9):1608-1616. 被引量:27
  • 2李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 3王丽娜,施德军,覃伯平,周贤伟.基于Merkle散列树的无线传感器网络实体认证协议[J].传感技术学报,2007,20(6):1338-1343. 被引量:5
  • 4Seog Chung Seo,Hyung Chan Kim,Ramakrishna R S.A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks[J].Lecture Notes in Computer Science,2006,4097:291-301.
  • 5An Liu,Peng Ning.TinyECC:A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks[C]//Proceedings of the 7th International Conference on Information Processing in Sensor Networks,2008:245-256.
  • 6Don B Johnson,Alfred J Menezes,Scott Vanstone.Elliptic Curve Digital Signature Algorithm[Z/OL].http://www.certicom.com/resources/download/ecdsa.ps.
  • 7Jung Hee Cheon,Dong Hoon Lee.Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations[J].IEEE Transactions on Computers,2006,55 (12):1536-1542.
  • 8Daniel J.Bernstein,Tanja Lange.Inverted Edwards Coordinates[C]//17th Applied Algebra,Algebraic Algorithms,and Error Correcting Codes Symposium,2007.
  • 9Du W, Wang R, Ning EAn efficient scheme for authenticating public keys in sensor networks[C]//Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing,New York,NY, USA, 2005: 58-67.
  • 10Wander A, Gura N, Eberle H, et al.Energy analysis of public key cryptography on small wireless devices[C]//IEEE International Conference on Pervasive Computing and Communications, Kauai, Hawaii, 2005 : 324-328.

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部