期刊文献+

一种轻量级的WSN认证和密钥协商方案 被引量:4

A Light-weight Authentication and Key Agreement Scheme for Wireless Sensor Network
下载PDF
导出
摘要 针对无线传感器网络中数据收集的安全性和有效性问题,使用单向哈希函数和对称加密算法,提出一种轻量级的认证和密钥管理方案。该方案利用消息认证码保证传输信息的完整性,同时验证共享会话密钥的正确性,通过循环移位技术,仅需调用一次随机数生成器即可生成不同的随机数,从而提高传感器的计算效率,节省存储空间。分析结果表明,该方案的计算量为(10+tb)次哈希计算、6次对称加密/解密以及3次异或操作,存储空间为80 bit,相比同类方案更加安全有效。 This paper proposes a light-weight authentication and key management scheme by using one-way hash function and an efficient symmetric cryptography algorithm, according to the security and efficiency problems of data collection applications in Wireless Sensor Network(WSN). It uses the message authentication code to achieve the integrality for transmitted messages, verifies the correctness of shared session key, and simply calls a random-number generator by using cyclic shift technique to generate different random numbers, thereby improving the computational performance of sensors and saving storage space. Analysis result shows that the calculated amount of this scheme includes (10+tb) hash calculations, six symmetric encryptions/decryptions and three XOR operations, and storage space is 80 bit. Compared with the similar schemes, it is more secure and effective.
出处 《计算机工程》 CAS CSCD 2013年第3期146-151,共6页 Computer Engineering
基金 国家自然科学基金资助项目(60773083) 广东省自然科学基金资助项目(2008B090500201 2009B010800023) 暨南大学科技创新基金资助项目(11611510)
关键词 无线传感器网络 数据收集 认证 密钥协商 密钥管理 Wireless Sensor Network(WSN) data collection authentication key agreement key management
  • 相关文献

参考文献10

  • 1Akyildiz Wireless F, Su Weilian, Sankarasubramaniam Sensor Network: A Survey[J] Networks, 2002, 38(4): 393-422 Y, et al. Computer.
  • 2任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 3Poornima A S, Amberker B B, Likith H S R, et al. Secure Data Collection in Sensor Networks Using Tree-based Key Management Scheme and Secret Sharing[C]//Proc. of 2010 International Conference on Computer Information Systems and Industrial Management Applications. Krackow, Poland: [s. n.], 2010.
  • 4Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2004, 47(6): 53-57.
  • 5Carman D W, Kruus P S, Matt B J. Constraints and Approaches for Distributed Sensor Network Security[R]. The Security Research Division Network Associates, Inc., Tech. Rep.: 010, 2000.
  • 6Sierra J M, Castro J C H, Jayaram N, et al. Low Computational Cost Integrity for Block Ciphers[J]. Future Generation Computer Systems, 2004, 20(5): 857-863.
  • 7Chan Haowen, Perrig A, Song Dawn. Random Key Predistribution Schemes for Sensor Networks[C]//Proc. of 2003 IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Computer Society, 2003.
  • 8Du Wenliang, Deng Jing, Han Yunghsiang, et al. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks[C]//Proc. of the 10th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2003.
  • 9Delgado-Mohatar O, Fuster-Sabater A, Sierra J M. A Light-weight Authentication Scheme for Wireless Sensor Networks[J]. Ad Hoc Networks, 2011, 9(5): 727-735.
  • 10Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. Boca Raton, USA: CRC Press, Inc., 1996.

二级参考文献32

  • 1ALERT. http://www.altersystem.org.
  • 2Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 3Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.
  • 4Sensor Webs. http://sensorwebs.jpl.nasa.gov/.
  • 5Shill E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the ACM MobiCom 2001. Rome: ACM Press, 2001. 272-286.
  • 6Akyildiz I.F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4):393~422.
  • 7Asada G, Dong M, Lin TS, Newberg F, Pottle .G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15-20.
  • 8Sohrabi K, Pottie GJ. Performance of a novel self-organization protocol for wireless Ad hoc sensor networks. In: Proceedings of the IEEE 50th Vehicular Technology Conference. Amsterdam, 1999. 1222~1226.
  • 9Sinhua A, Chandrakasan A. Dynamic power management in wireless sensor network. IEEE Design and Test of Computer, 2001,18(2):62~74.
  • 10Lm C, Kim H, Ha S. Dynamic voltage scheduling technique for low-power multimedia application using buffers. In: Proceedings of the International Symposium on Low Power Electronics and Design. California: ACM Portal Press, 2001. 34~39.http://eeserver.korea.ac.kr/-bk21/arch/bk21 conf/26.pdf.

共引文献1708

同被引文献27

  • 1王景存,张晓彤,陈彬,陈和平.一种基于Dijkstra算法的启发式最优路径搜索算法[J].北京科技大学学报,2007,29(3):346-350. 被引量:27
  • 2刘明,曹建农,陈贵海,陈力军,王晓敏,龚海刚.EADEEG:能量感知的无线传感器网络数据收集协议[J].软件学报,2007,18(5):1092-1109. 被引量:67
  • 3Rajaravivarma V,Yang Y,Yang T.An Overview of Wireless Sensor Network and Application[C]//Proc of 35th Southeastern Symposium on System Theory,Morgantown,USA,2003:432-436.
  • 4Eric S,Adhan M,Kang D K.An Application-Driven Perspective on Wireless Sensor Network Security[C]//Proc of Q2SWinet’06,Torremolinos,Spain,2006.
  • 5Muts chlechner M,Li B J,Kapitza R,et al.Using Erasure Codes to Overcome Reliability Issues in Energy-Constrained Sensor Networks[C]//Proc of 11th Annual Conference on Wireless On-demand Network Systems and Services(WONS),Obergurgl,Austria,2014:41-48.
  • 6Latre B,Braem B,Moerman I,et al.A Survey on Wireless Body Area Networks[J].Wireless Networks,2011,17(1):1-18.
  • 7Kumar P,Lee H J.Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks[R].Applied Cryptography And Network Security.2012:153-168.
  • 8Simplicio M A,Oliveira B T,Barreto P S,et al.Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks[C]//Proc of 36th Conference on Local Computer Networks(LCN),Bonn,Germany,2011:450-457.
  • 9Tan H,Ostry D,Zic J,et al.A Confidential and Dos-Resistant Multi-Hop Code Dissemination Protocol for Wireless Sensor Networks[J].Computers&Security,2012,32:36-55.
  • 10Eschenauer L,Gligor V D.A Key-Management Scheme for Distributed Sensor Networks[C]//Proc of the 9th ACM Conference on Computer and Communication Security(CSS’02).Washington DC,USA,2002:41-47.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部