期刊文献+

一种改进的动态用户认证协议 被引量:8

Improved Dynamic User Authentication Protocol
下载PDF
导出
摘要 介绍了无线传感器网络中典型的动态用户认证协议,并指出了其优点和问题.在引入一种新的无线传感器网关结构的基础上提出了对动态用户认证协议的改进方案.分析表明:改进的协议保留了原协议高效、低耗的特点并加强了安全性和增加了用户便利性. We introduce the classic dynamic user authentication protocols in WSNs(wireless sensor network),and analyze its advantage and problem.We introduce a new WSNs gateway structure.Base on it,we propose an improved dynamic user authentication protocol.The analysis shows the improved protocol keeps the original characteristics of high efficiency and low consumption,and it enhances security and increases the user′s convenience.
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第1期42-46,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.61172053 No.61003234 No.U0835004) 北京市自然科学基金(No.4102012) 国家863高技术研究发展计划(No.2012AA011706)
关键词 无线传感器网络 动态认证协议 网络安全 WSNs dynamic user authentication protocol network security
  • 相关文献

参考文献9

  • 1周贤伟,施德军,覃伯平.无线传感器网络认证机制的研究[J].计算机应用研究,2006,23(12):108-111. 被引量:6
  • 2李中献,詹榜华,杨义先.认证理论与技术的发展[J].电子学报,1999,27(1):98-102. 被引量:82
  • 3Kirk H M Wong,Yuan Zheng,Jiannong Cao. A dynamic user authentication scheme for wireless sensor networks[A].SUTC,2006.244-251.
  • 4C Y Lee,C H Lin,C C Chang. An improved low communication cost user authentication[A].Taiwan:AINA,2005.249-252.
  • 5H R Tseng,R H Jan,W Yang. An improved dynamic user authenticauion scheme for wireless sensor networks[A].GLOBECOM,2007.986-990.
  • 6Binod Vaidya,Jorge Sá Silva,Joel J P C Rodrigues. Robust dy[A].Spain:ACM,2009.28-29.
  • 7Lee-Chun Ko. A novel dynmic user authentication scheme for wireless sensor networks[A].2008.608-612.
  • 8裴庆祺,宁奔,吴洋,杨亮,尹浩,唐宏.基于虚拟机的异构环境下无线传感器网络网关设计[J].网络安全技术与应用,2011(6):5-8. 被引量:1
  • 9Zhen Cao,Xia Zhou,Maoxing Xu. Enhancing base station secu rity against QoS attacks in wireless sensor networks[A].Wuhan:IEEE,2006.1-4.

二级参考文献25

  • 1D Gao, Y Niu. Micro Sensor Routing Protocol in IPv6 Wireless Sensor Network[C]. IEEE Networking, Sensing and Control. 2009.
  • 2M El Barachi,A Kadiwal,R Glitho.The Design and Implemen- tation of a Gateway for IP Multimedia Subsystem[C]. Wireless Sensor Networks Interworking.VTC Spring.2009.
  • 3http://baike.baidu.com/view/l 132.htm.
  • 4KA Emara,M Abdeen, A Gateway-based Framework for Transparent Interconnection between WSN and IP Network[J].EUROCON'09. 2009.
  • 5Zhou J,Proc of 1997 IEEE Symposium on Research in Security and Privacy,1997年,126页
  • 6Yen S,IEICE Trans Fundamentals,1997年,80卷,11期,2209页
  • 7Liu Jianwei,PIMRC’96,1996年,1239页
  • 8Zhou J,Proc of 1996 IEEE Symposium on Research in Security and Privacy,1996年,55页
  • 9Hong G,Computer Communications,1996年,19期,848页
  • 10A J Menezes,P C V Oorschot,S A Und Vanstone.Handbook of Applied Cryptography[M].Boca Raton,FL:CRC Press,1997.92-93.

共引文献86

同被引文献92

  • 1DAS M L. Efficient user authentication and secure data transmissionin wireless sensor networks[ C] // Proceedings of the 16th IEEE In-ternational Conference on Networks. Piscataway: IEEE, 2008: 1 -6.
  • 2CHEN T H, SHIH W K. A robust mutual authentication protocol forwireless sensor networks[ J]. ETRI Journal, 2010,32( 5): 704 -712.
  • 3KHAN M K, ALGHATHBAR K. Cryptanalysis and security im-provements of two-factor user authentication in wireless sensornetworks’[ J]. Sensors, 2010,10(3): 2450 -2459.
  • 4HE W, LIU X, NGUYEN H, et al. PDA: Privacy-preserving dataaggregation in wireless sensor networks [ C ]// Proceedings of the26 th IEEE Conference on Computer Communications (INFOCOM).Piscataway: IEEE, 2007, 2045 -2053.
  • 5DAS M L. Two-factor user authentication in wireless sensornetworks [ J ]. IEEE Transactions on Wireless Communications,2009, 8(3):1086 -1090.
  • 6TIWARI H,ASAWA K. A secure and efficient cryptographic hashfunction based on NewFORK-256 [ J ]. Egyptian InformaticsJournal, 2012,13(3):199 -208.
  • 7KHAN M K,ALGHATHBAR K. Cryptanalysis and securityimprovements of two-factor user authentication in wireless sensornetworks[ J]. Sensors, 2010,10(3) : 2450 -2459.
  • 8DYANG D H,LEE M K. Improvement of Das’s two-factorauthentication protocol in wireless sensor networks [ J/OL ],(2009- 12- 20) [ 2013- 06- 20 ]. http://eprint. iacr. org/2009/631. pdf.
  • 9CHEN T H, SHIH W K. A robust mutual authentication protocolfor wireless sensor networks [ J]. ETRI Journal, 2010, 32(5):704-712.
  • 10A Akavia,S Goldwasser,V Vaikunmnathan.Simultaneous hardcore bits and cryptography against memory attacks[A].Proceedings of the 6th Theory of Cryptography Conference (TCC 2009)[C].Berlin:Spdnge-Verlag,2009.474-495.

引证文献8

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部