期刊文献+

WSN中基于圆锥曲线组合密钥的对等认证 被引量:1

Reciprocal Authentication Based on a Conic Curve Combined Public Key in Wireless Sensor Networks
下载PDF
导出
摘要 综合分析了无线传感器网络已有认证协议在加密体系、PKC公钥绑定及应对攻击形式等方面的发展趋势和不足,给出引入了位置信息的基于身份的节点对等认证方案.该方案采用在求逆、求阶及求点倍数等操作比椭圆曲线容易的圆锥曲线加密体系.基于身份避免了证书的颁发/更新、存储、索取、验证等计算和通信开销;引入位置信息使得方案更健壮,形式化分析证明该方案是安全的.基于MICAx系列无线传感器网络节点的能耗分析结果表明:方案能很好地适用于资源受限的WSN环境. Comprehensive analysis was conducted on the development trends and deficiencies of a wireless sensor network(WSN) with authentication protocols,especially with regard to encryption,public key cryptography binding,and answer attack modes,to provide location information based on a scheme for reciprocal authentication of personal ID nodes.The scheme utilizes conic curve cryptography(CCC),which is more efficient and easier to use in inverse operations,order computations, and point multiplication computations than elliptic curve cryptography(ECC).Location information introduced into the ID-based scheme makes the protocol more resilient and robust in thwarting new attacks.The protocol was shown to be secure and energy cost analysis of the protocol demonstrated its feasibility.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第3期348-351,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60803131) 沈阳市科技计划项目(1091176-1-00)
关键词 对等认证 圆锥曲线 组合密钥 无线传感器网络 无线安全 reciprocal authentication conic curve(CC) combined public key(CPK) wireless sensor networks(WSN) wireless security
  • 相关文献

参考文献8

  • 1Du W, Wang R, Ning P. An efficient scheme for authenticating public keys in sensor networks [ C ] // Proceedings of the 6th ACM International Symposium on Mobile Ad Hoe Networking and Computing. New York: ACM Press, 2005 : 58 - 67.
  • 2Wander A, Gura N, Eberle H, et al. Energy analysis of public key cryptography on small wireless devices[ C]//IEEE International Conference on Pervasive Computing andCommunications. Hawaii: IEEE, 2005:324-328.
  • 3Malan D J, Welsh M, Smtth M D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]//IEEE International Conference on Sensor and Ad Hoc Communications and Networks. Santa Clara: IEEE, 2004:71 - 80.
  • 4Panja B, Madria S K. An energy and communication efficient group key in sensor networks using elliptic curve polynomial [C]//Proceedings of the 6th International Conference on Ad- hoc, Mobile and Wireless Networks. Berlin: Springer-Verlag, 2007 : 153 - 171.
  • 5Yu M Y, Jiang L, Huang X P, et al. Combined public key cryptosystem based on conic curves over the ring Zn [C ]// International Conference on Computer Science and Software Engineering. Wuhan, 2008:631 - 634.
  • 6南湘浩,陈钟.网络安全技术概论[M].北京:国防工业出版社,2006:51-67.
  • 7Fabrega F J T, Hrzog J C. Strand spaces: why is a security protocol correct? [ C] // Proceedings of 1998 IEEE Symposium on Security and Privacy. Oakland, California: IEEE, 1998:160-171.
  • 8Zhang Q Y, Zhou X H, Yang F. Distributed node authentication in wireless sensor networks [ C ]//Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. Beijing, 2009:3361 - 3364.

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部