期刊文献+

基于CPK的融合网络密钥建立与认证 被引量:2

Key establishment and authentication scheme for heterogeneous integrated network based on CPK
下载PDF
导出
摘要 针对无线传感器网络(WSN)和Internet融合网络节点异构特性,在介绍CPK算法的基础上,提出了融合网络节点间密钥建立与身份认证方案。考虑不同节点的资源情况,利用计算机终端(PIR节点)集中存储节点公共信息,将传感器节点的签名验证计算转移至PIR完成,减少节点能耗,同时解决节点间基于不同标识的认证问题。结果表明该方案具有计算量小、存储量少、能耗低的特点,能安全有效地实现融合网络节点间双向身份认证。 A key establishment and authentication scheme inspired by Combined Public Key (CPK) algorithm was proposed for the integrated network of Wireless Sensor Network (WSN) and Internet, in allusion to the heterogeneous characteristics of nodes. In this scheme, Public Information Repository (PIR) node of Internet was used to store the public information in consideration of various resource limits. By transferring the computing of signature verification from the sensor nodes to the PIR, it solved the authentication between nodes with different identity, and had advantage of less energy consumption of sensor nodes. Through analysis, the proposed scheme was proved to be efficient in the mutual authentication at a high security level with less computing, smaller storage and lower energy cost.
出处 《计算机应用》 CSCD 北大核心 2009年第B12期72-75,共4页 journal of Computer Applications
基金 国家863计划项目(2009AA01Z204)
关键词 异构融合网络 CPK 标识认证 安全 heterogeneous integrated network Combined Public Key (CPK) identity authentication security
  • 相关文献

参考文献14

  • 1ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [ C]// CCS'02: Proceedings of the 9th ACM Conference on Computer and Communication Security. New York: ACM Press, 2002:41-47.
  • 2LIU DONG-GANG, NING PENG. Establishing pairwise keys in distribnted sensor network [ C] // Proceedings of the 10th ACM Conference on Computer and Communications Security. New York: ACM Press, 2003:52-61.
  • 3HARNEY H, HARDER E. Logical key hierarchy protocol [ EB/ OL]. [ 2009 - 01 - 12]. http://tools. ieff. org/html/draft-harneysparta-lkhp-sec-00.
  • 4MALAN D J, WELSH M., SMITH M D. A public-key infrastructure for key distribution in TinyOS based on dliptic curve cryptography [ C]//SECON 2004: Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. Santa Clara: [ s. n. ], 2004:71 -80.
  • 5LI JING-JING, TAN LE, LONG DONG-YANG. A new key management and authentication method for WSN based on CPK [ C]// Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management. Washington, DC: IEEE Computer Society, 2008:486-490.
  • 6ZHANG YU, ZHOU XING-SHE, JI YI-MING, et al. Secure and DoS-resistant network reprogramming in sensor network based on CPK [ C]//WiCOM'08: Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. Beijing: [s. n. ], 2008:1 -5.
  • 7LEI FENG-YU, CUI GUO-HUA, LIAO XIAO-DING. Ad Hoc network security mechanism based on CPK [ C]// CISW 2007: Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops. Washington, DC: IEEE Computer Society, 2007:522 -525.
  • 8唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用,2003,39(21):1-3. 被引量:25
  • 9KIM J, KIM D, KWAK H, et al. Address Internetworking between WSNs and Intemet supporting Web services [ C]// Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering. Washington, DC: IEEE Computer Society, 2007: 232 - 240.
  • 10FALL K. A delay-tolerant network architecture for challenged Internets [ C]//Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protecols for Computer Communications. New York: ACM Press, 2003:27-34.

二级参考文献3

  • 1南相浩 唐文 余嘉宁.ECC组合公钥[A]..中国计算机学会信息保密专业委员会论文集:第11卷[C].,2001-09..
  • 2N Koblitz.Elliptic curve cryptosystems[J].Mathematics of Computation, 1987 ;48 : 203-209.
  • 3V Miller.Uses of elliptic curves in cryptography[C].In:Advances in Cryptology-Crypto'85 ,LNCS 218,1986:417,426.

共引文献24

同被引文献16

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部