期刊文献+

无线传感器网络快速广播认证协议研究

On the Fast Broadcast Authentication Protocols in Wireless Sensor Networks
下载PDF
导出
摘要 现有的高效无线传感器网络广播认证协议一般难以避免认证延迟,不适用于要求即时响应的应用和采用逐跳认证机制。本文总结了现有消除广播认证协议认证延迟的方法,指出其本质是将接收端延迟转化为发送端延迟,没有完全消除认证延迟。本文提出在满足应用需求前提下可放宽对认证延迟的要求,在此基础上提出了快速广播认证协议FBAP。该协议根据广播报文的发送速率和频繁程度灵活设置,通过提前发送报文认证信息,较好地满足了放宽的认证延迟要求。分析和实验表明,FBAP协议具有可控的认证延迟上限,与已提出的RPT等协议相比,具有适用范围广、通信开销小等优点。 Some efficient broadcast authentication protocols have been proposed for wireless sensor networks. However, these protocols face the authentication delay problem, which is not suitable for the applications that needs quick response and hop-by-hop authentication mechanisms. This paper concludes the protocols proposed for immediate authentication and points out that they actually turn the authentication delay from receivers to senders. This paper proposes a new fast broadcast authentication a protocol named FBAP (Fast Broadcast Authentication Protocol). FBAP is based on the loose demand on authentication delay. Through carefully configuration on a packet sending mechanism, the authentication delay of FBAP is limited to a threshold. It is concluded from analyses and performance evaluations that FBAP works well in more communieation scenarios and has a smaller communication overhead than RPT and other protocols proposed before.
作者 赵鑫 王晓东
出处 《计算机工程与科学》 CSCD 北大核心 2010年第4期106-109,113,共5页 Computer Engineering & Science
基金 国家973计划资助项目(2006CB303000)
关键词 广播认证 认证延迟 数字签名 broadcast authentication authentication delay digital signature
  • 相关文献

参考文献9

  • 1Perrig A, Szewczyk R,Wen V, et al. Spins:Security Protocols for Sensor Networks[J]. Wireless Networks, 2002,8 (5) : 521- 534.
  • 2Perrig A, Canetti P, Tygar J D, et al. Efficient Authentication and Signing of Multieast Streams Over Lossy Channels[C]// Proc of the 21th IEEE Computer Society Symp on Research in Security and Privacy, 2000:26-75.
  • 3Perrig A,Canetti R, Song D, et al. Efficient and Secure Source Authentication for Multicast[C]// Proc of NDSS '01,2001:35-46.
  • 4Luk M, Perrig A, Whillock B. Seven Cardinal Properties of Sensor Network Broadcast Authentication[C]// Proc of the 4th ACM Workshop on Security of Ad Hoe and Sensor Networks, 2006 : 147-156.
  • 5Schaller P, Capkun S, Basin D. Bap: Broadcast Authentication Using Cryptographic Puzzles[C]//Proc of the 5th Int'l Conf on Applied Cryptography and Network Security, 2007: 401- 419.
  • 6Gaubatz G, Kaps J P, Sunar B. Public Key Cryptography in Sensor Networks-Revisited[C]// Proc of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks, 2004,2-18.
  • 7Piotrowski K, Langendorfer P, Peter S. How Public Key Cryptography Influences Wireless Sensor Node Lifetime[C]//Proc of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, 2006 : 169-176.
  • 8Dutta P K, Hui J W, Chu D C, et al. Securing the Deluge Network Programming System[C]// Proc of the 5th Int'l Conf on Information Processing in Sensor Networks, 2006: 326-333.
  • 9Lanigan P E, Gandhi R, Narasimhan P. Sluice.. Decure Dissemination of Code Updates in Sensor Networks[C]// Proc of the 26th IEEE Int'l Conf on Distributed Computing Systems, 2006 : 53-63.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部