期刊文献+

无线传感器网络的轻量级安全体系研究 被引量:21

Lightweight security architecture design for wireless sensor network
下载PDF
导出
摘要 结合无线传感器网络现有的安全方案存在密钥管理和安全认证效率低等问题的特点,提出了无线传感器网络的轻量级安全体系和安全算法。采用门限秘密共享机制的思想解决了无线传感器网络组网中遭遇恶意节点的问题;采用轻量化ECC算法改造传统ECC算法,优化基于ECC的CPK体制的思想,在无需第三方认证中心CA的参与下,可减少认证过程中的计算开销和通信开销,密钥管理适应无线传感器网络的资源受限和传输能耗相当于计算能耗千倍等特点,安全性依赖于椭圆离散对数的指数级分解计算复杂度;并采用双向认证的方式改造,保证普通节点与簇头节点间的通信安全,抵御中间人攻击。 Most previous security proposal did not consider key management or their authentication efficiency was very low. Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network, The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism. The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC, authentication was efficient without the third-party CA, and could reduce the computational com- plexity, the key management could meet the resource limit in wireless sensor network, and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition. The scheme used the improved two-way authentication to ensure the communication security between common node and sink node, which could prevent man-in-the-middle attack.
出处 《通信学报》 EI CSCD 北大核心 2012年第2期30-35,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60970006 60970115 91018008) 空天信息安全与可信计算教育部重点实验室开放基金资助项目(AISTC2009_04) 上海市重点学科和科委重点实验室基金资助项目(S30108 08DZ2231100)~~
关键词 无线传感器网络 认证 密钥管理 轻量级ECC wireless sensor network authentication key management lightweight ECC
  • 相关文献

参考文献12

  • 1GERLA M. Ad Hoc Networks: Technologies and Protocols[M]. Springer Science Press,2004.
  • 2王潮,张振华,应仲平.WSN中基于身份的分散密钥管理研究[A].第六届中国测试学术会议论文集[c].2010.
  • 3IBRIQ J, MAHGOUB I. A hierarchical key establishment scheme for wireless sensor networks[C]. AINA'07[C]. Niagara Falls, Canada, 2007.210-219.
  • 4FANTACCI R, CHITI F, MACCARI L. Fast distributed bi-directional authentication for wireless sensor networks [J]. Security and Communication Networks, 2008, 1(l): 17-24.
  • 5HAN K, SHON T, KIM K. Efficient mobile sensor authentication in smart home and WPAN [J]. IEEE Transactions on Consumer Electronics, 2010, 56(2): 591-596.
  • 6HAN K, KIM K, SHON T. Untraceable mobile node authentication in WSN[J]. Sensors, 2010, 10(5): 4410-4429.
  • 7组合公钥(CPK)体制标准(v5.0)[J].计算机安全,2010(10):1-2. 被引量:9
  • 8王潮 朱美丽 时向勇.基于ECC的CBTC无线接入安全认证架构研究.哈尔滨工业大学学报(增刊),2009,41:193-197.
  • 9王潮,时向勇,牛志华.基于Montgomery曲线改进ECDSA算法的研究[J].通信学报,2010,31(1):9-13. 被引量:14
  • 10OKEYA K, SAKURAI K. A scalar multiplication algorithm with recovery of y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystem[J]. IEICE Trans Fundamental, 2002, 85(1): 84-93.

二级参考文献16

  • 1KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Compution American Mathematical Society, 1987(48): 203-309.
  • 2MILLER V. Use of elliptic curves in cryptography[A]. Advance in Cryptology-Proceedings of CRYPTO 1985, Lecture Notes in Computer Science[C]. Springer, 1986. 417-426.
  • 3MONTGOMERY P L. Speeding the pollard and elliptic curve methods of factorizations[J]. Math. Comp, 1987, 48: 243-264.
  • 4MONTGOMERY P L. Modular multiplication without trial division[J]. Mathematics of Computation, 1985, 44(170): 519-521.
  • 5LOPEZ J, DAHAB R. Fast Multiplication on elliptic curves over GF(2^m) without precomputation[A]. Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems[C]. London, UK: Springer Verlag, 1999.316-327.
  • 6OKEYA K, SAKURAI K. Use of Montgomery trick in precomputation of multi-scalar multiplication in elliptic curve cryptosystems[J]. IFACE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2003,86(1): 98-112.
  • 7IZU T. Elliptic curve exponentiation for cryptosystem[A]. SCIS'99[C]. 1999.275-280.
  • 8OKEYA K, SAKURAI K. A scalar multiplication algorithm with recovery of y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystem[J]. IEICE Trans Fundamental, 2002, 85(1): 84-93.
  • 9OKEYA K, KURUMATANI H, SAKURA K. Elliptic curves with the montgomery-form and their cryptographic applications[A]. Public Key Cryptography (PKC2000), LNCS1715[C]. 2000. 238-257.
  • 10FUTA Y, OHMORI M. Efficient scalar Multiplication on Montgomery-form elliptic curves[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004,87(8): 2126- 2136.

共引文献20

同被引文献200

引证文献21

二级引证文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部