期刊文献+

异构传感器网络基于身份的认证及密钥协商方案 被引量:1

An Identity-based Authenticated Key Agreement Sheme for Heterogeneous Sensor Networks
原文传递
导出
摘要 结合身份密码体制,提出了一个基于身份和地理位置信息的异构传感器网络(HSN)节点间的双向认证及密钥协商方案。不同性能节点之间采用不同的协议完成身份认证和密钥建立,充分发挥了高性能节点的能力,降低了低性能节点的能耗。该方案具有完美前向保密性和主密钥前向保密性,具有较好的抗节点伪造、节点复制和女巫攻击能力。分析与仿真表明,该方案具有较好的安全性。 This paper presents a mutual authenticated key agreement scheme for heterogeneous sensor networks(HSN) using identity-based cryptography.In this scheme,different types of sensors execute different protocols to finish identity authentication and establish shared keys according to their capacities,making the resource of power nodes be used effectively and making the energy of less capable sensors be saved in great deal.This scheme provides perfect forward secrecy and master key forward secrecy and can better resist nodes impersonation,nodes replication and sybil attack.The analysis and simulation results show that this scheme has more security properties and lower cost.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2010年第5期582-586,共5页 Geomatics and Information Science of Wuhan University
基金 国家博士后科学基金资助项目(20070410896) 黑龙江省博士后科研启动基金资助项目(LBH-Z06027) 网络与交换技术国家重点实验室开放研究基金资助项目(SKLNST-2009-1-10)
关键词 异构传感器网络 密钥协商 基于身份密码体制 双向认证 heterogeneity sensor networks key agreement identity-based cryptography mutual authenticati
  • 相关文献

参考文献2

二级参考文献43

  • 1陈菲,宋志高,陈克非.无线传感器网络中对密钥管理评估指标研究[J].计算机仿真,2005,22(5):137-140. 被引量:17
  • 2杨少春,郎为民,谭珂科.基于密钥预分配的传感器网络加密方案[J].信息工程大学学报,2005,6(4):11-14. 被引量:5
  • 3王佳昊,王胜坤,秦志光,李志军.随机预分配密钥在WSN跟踪算法中的应用[J].四川大学学报(工程科学版),2005,37(6):113-119. 被引量:6
  • 4ESCHENAUER L,GL IGOR V D.A key-management scheme for distributed sensor net works[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM Press,2002:41 -47.
  • 5DI PIETRO R,MANCINI L V,MEI A.Random key assignment for secure wireless sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:62-71.
  • 6CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//Proceedings of IEEE Symposium on Research in Security and Privacy,May 11 -14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213.
  • 7LAUTER K.The advantages of elliptic curve cryptography for wireless security[J].IEEE Wireless Communications,2004,11(1):62-67.
  • 8DU W,DENG J,HAN Y S,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 9BLOM R.An optimal class of symmetric key generation systems[C]//Proceedings of Advances in Cryptology(EUROCRYPT 84),Apr 9-11,1985,Paris,France.Berlin,Germany,Springer,1985:335-338.
  • 10LIU D,NING P.Location-based pairwise key establishments for static sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:72-82.

共引文献15

同被引文献14

  • 1YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 2Lauter K. The advantages of elliptic curve cryptography for wireless security[J]. Wireless Communications, IEEE, 2004,11 (1):62-67.
  • 3Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings[C].Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, 2003.
  • 4Law L, Menezes A, Qu M, et al. An Efficient Protocol for Authenticated Key Agreement[J]. Designs, Codes and Cryptograp hy,2003,28(02):119-134.
  • 5Bellare M, Namprempre C, Neven G. Security Proofs for Identity-Based Identification and Signature Schemes[J]. J. Cryptol., 2008,22(01):1-61.
  • 6Smart N P. Identity-based authenticated key agreement protocol based on Weil pairing[J]. Electronics Letters, 2002,38(i3):630-632.
  • 7Sun H, Hsieh B. Security Analysis of Shim's Authenticated Key Agreement Protocols from pairings[J]. IAC1K Cryptology ePrint Archive,2003,21(05):110-113.
  • 8Xiaokang X, Wong D S, Xiaotie D. TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory[C]. Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on, 2009.
  • 9孙纪敏,孙玉,张思东,裴庆祺.基于ID的认证及密钥协商协议[J].西安电子科技大学学报,2008,35(3):559-562. 被引量:8
  • 10章睿,刘吉强,赵佳.一种基于ID的传感器网络密钥管理方案[J].电子与信息学报,2009,31(4):929-932. 被引量:11

引证文献1

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部