期刊文献+

基于双线性对的无线传感器网络匿名广播认证协议 被引量:2

Anonymous broadcast authentication protocol for wireless sensor networks based on bilinear pairing
下载PDF
导出
摘要 提出了一种无线传感网络上的基于公钥的匿名广播认证机制,能够达到即时广播认证,避免了认证体制所面临的攻击行为,同时也实现了用户的匿名。证书中心(CA)只离线地为用户颁发或者更新一个根证书,用户每次参与认证时使用根证书自己计算产生一个一次性伪名证书,保证了用户的匿名性和不可关联性。另一方面,CA不参与认证过程,保证了协议的效率。而且,CA可以对非法用户进行追踪和撤消其根证书,保证了整个体制的完备性。 An anonymous broadcast authentication protocol based on public key in Wireless Sensor Networks(WSNs) is presented.This scheme can achieve immediate broadcasting authentication and realize anonymity of users,avoiding Denial-of-Service(DOS) attack suffered by other schemes.In this scheme,the Certificate Authority(CA) only needs to issue or update a root certificate for a user offline.Thereafter,the user can compute and generate pseudonymous certificate,which is only used in one authentication procedure,hence assures the anonymity and unlinkability of the user.Moreover,the CA is totally on leave during the authentication procedure,which makes the scheme efficient and scalable.The CA is also able to trace and even revoke the users with illegal actions,which ensures the completeness of the scheme.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2011年第2期468-472,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60963024 60803151) 广西区自然科学基金项目(0991079)
关键词 计算机应用 无线传感器网络 双线性对 广播认证 匿名 computer application; wireless sensor network; blinear pairing; broadcast authentication; anonymous;
  • 相关文献

参考文献16

  • 1Akyildiz I, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks [J]. IEEE Communica- tions Magazine, 2002, 40(8) :102-116.
  • 2Kyildiz I, Kasimoglu I. Wireless sensor and actor networks: research challenges[J]. Ad Hoc Net- works, 2004, 2(4):351-367.
  • 3Perrig A, Szewczyk R, Wen V,et al. SPINS: secu- rity protocols for sensor networks[C]//Proc of Mo- biCom'01, Roma, Italy, 2001.
  • 4Wander A, Gura N, Eberle H, et al. Energy analy- sis of public-key cryptography on small wireless de- vices[C]//IEEE PerCont'05, Pisa, Italy, 2005.
  • 5Du W, Wang R, Ning P. An efficient scheme for authenticating public keys in sensor networks[C]// In Proceedings of MobiHoc'05, Urbana-Champaign, Illinois, USA, 2005.
  • 6Haque M,Pathan ASK,HongCS,et al. An asym- metric key-based security architecture for wireless sensor networks[J]. KSII Transactions on Internet and Information Systems, 2008,2(5) :265-279.
  • 7Wong D S. IB SSMS--Secure mobile messaging[EB/ OL]. [2009-05-21].http://www. cs. cityu. edu. hk/ ecc/IB-SSMS/.
  • 8Tan Chiu C, Wang Hao dong, Zhong Sheng, et al. Body sensor network security: an identity-based cryptography approach (short paper) [C]//Proc of ACM WiSec, Alexandria, VA, USA ,2008.
  • 9陈礼青,张福泰.一种新的基于身份的安全组播密钥协商方案[J].电子与信息学报,2008,30(1):21-24. 被引量:2
  • 10Shamir A. Identity based eryptosystems and signa- ture schemes[C]//Proc of CRYPTO'84, LNCS, Springer Verlag, 1984.

二级参考文献4

  • 1Deering S. Host extensions for IP multicasting[S]. RFC 1112,IETF, 1989.
  • 2Wang Liming and Wu Chuankun. Efficient key agree ,ment for large and dynamic multicast groups[J]. International Journal of Network Security, 2006, 3(1): 11-20.
  • 3Boneh D and Franklin M. Identity-based encryption from the Weil pairing[C]. Advances in Cryptology Crypto 2001, Springer-Verlag, 2001, LNCS 2139: 213-229.
  • 4Al-Riyami S S and Paterson K G. Certificateless publ -ic key cryptography[C]. Advances in Asiacrypt 2003, Berlin, Springer-Verlag, 2003, LNCS 2894: 452-473.

共引文献1

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部