期刊文献+

基于无证书密码学的WSN认证方案 被引量:1

The Authentication Scheme of WSN Based on Certificateless Cryptography
下载PDF
导出
摘要 无证书公钥密码体制克服了基于身份公钥密码体制中的密钥托管问题,没有传统公钥密码体制中证书管理带来的额外开销。但传统认证服务中强依赖于专门认证服务器和可信第三方的认证模式,认证运行成本高,针对集中认证处理能力低、需要低运行成本的WSN网络节点,不能运用传统认证的缺陷,提出一种基于无证书密码的WSN认证,该认证把网络节点的认证交给可信邻接点组成的认证集去完成。结果分析和仿真实验表明该认证方案对伪造、重放、冒充和俘获网络节点等攻击具有安全性。 Certificateless Public Key Cryptography (CL-PKC) eliminates the inherent key escrow problem of Identity-Based Cryptography (IBC), which dispenses with certificates of traditional Public Key Cryptography (PKC) and their costly management overhead. In view of the shortages that traditional authentication service strongly depends on the special authentication server and the trusted third party authentication mode,what is of high cost and centralized authentication capa- bilities can not meet the large number of nodes applying for certification simultaneously, pro- poses a WSN certificateless access authentication that give the certification to applying nodes to the adjacent points to complete, the analysis and simulation of the results shows that the authen- tication is secure and efficient.
作者 张桦
出处 《现代计算机》 2013年第10期8-12,共5页 Modern Computer
关键词 无证书密码学 WSN 认证 双线性 Certificateless Cryptography WSN Authentication Bilinear
  • 相关文献

参考文献10

  • 1A1-Riyami S S, Paterson K. Certificateless Public Key Cryp- tography: L NCS 2849: ASIA CRYPT, 2003[C]. Verlag:Berlin Springer, 2003:452-273.
  • 2Zhao-hui Cheng, Li-qun Chen, Li Ling, Richard Comley. General and Efficient Certifieateless Public Key Encryption Constructions. Pairing-Based Cryptography-Pairing 2007. Lecture Notes in Computer Science Volume 4575, 2007:83- 107.
  • 3Alexander W. Dent. A Survey of Certifieateless Encryption Schemes and Security Models. International Journal of Infor- mation Security. October 2008, Volume 7, Issue 5, pp 349- 377.
  • 4Huang Xin-yi, Mu YI, Susilo W, et al. Certificateless Signa- ture Revisited: LNCS 4586: ACISP 2007 [C]. Verlag:Berlin Springer,2007:308-322.
  • 5Zhang Z,Wong D S,Xu J,et al. Certificateless Public Key Sig- nature: Security Model and Efficient Construction: ILNCS 3989:Applied Cryptography and Network Security 2006[C]. Verlag: Berlin Springer,2006:293-308.
  • 6Barbose M, Farshim P. Certifieateless Signeryption. Cryptog- raphy Eprint Archive. Report 2008/143. URL: http://eprinLi- aerDeg/2008/143.2008.
  • 7曾迎之,苏金树,夏艳,黄清元,赵宝康.无线传感器网络安全认证技术综述[J].计算机应用与软件,2009,26(3):55-58. 被引量:9
  • 8Chen X,Zhang F,Kim K. A New ID-Based Group Si-Gnature Scheme from Bilinear Pairings: In:Proceeings of the WISA, 2003[C]. Korea: Jeju Island,2003:585-592.
  • 9马春波,敖珺,何大可.基于双线性映射的多重签名与群签名[J].计算机学报,2005,28(9):1558-1563. 被引量:14
  • 10陈家琪,冯俊,郝妍.基于无证书密码学的可认证三方密钥协商协议[J].计算机应用研究,2010,27(5):1902-1904. 被引量:13

二级参考文献35

  • 1马春波,何大可.矢量空间秘密共享群签名方案[J].电子学报,2005,33(2):294-296. 被引量:8
  • 2沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 3Alfred J. Menezes, Paul C. van Oorschot, Vanstone S A. Handbook of applied Cryptography. Crc Press Series on Discrete Mathematics and Its Applications, 1997.
  • 4WONG,et al. A dynamic user authentication scheme for wireless sensor networks[ A]. Sensor Networks, Ubiquitous, and Trustworthy Computing,2006. IEEE International Conference [ C ]. 2006:244 - 251.
  • 5Carman D W, Kruus P S, Matt B J. Constraints and Approaches for Distributed for Distributed Sensor Network Security. NAI Labs Technical Report, pages 00 - 010. September 1,2000.
  • 6Watro R, Kong D, et al. TinyPK : securing Sensor Networks with public key technology. 2nd ACM workshop on Security of ad hoc networks and sensor networks, ACM press, Pages ,2004:59 - 64.
  • 7覃伯平,徐福华.无线传感器网络与安全[G].国防工业出版社,第九章,2007:152-154.
  • 8Malan D J,Welsh M,et al. A public-key infrastructure for key distribution in TinyOS based on Elliptic Curve Cryptography. First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California, October 2004:71 - 80.
  • 9Adrian Perrig, Robert Szewczyk. SPINS:Security Protocols for Sensor Networks. Wireless Networks,2002,8 (5) :521 - 534.
  • 10YingZhi Zeng, BaoKang Zhao, JinShu Su, Xia Yan, Zili Shao. A Loop- Based Key Management Scheme for Wireless Sensor Networks, EUC2007 Workshop, December,2007, LNCS 4809 : 103 - 114.

共引文献33

同被引文献7

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部