期刊文献+

无线传感器网络中基于节点行为和身份的可信认证 被引量:7

Node behavior and identity-based trusted authentication in wireless sensor networks
下载PDF
导出
摘要 针对无线传感器网络(WSN)开放性和资源受限导致易受外部和内部攻击以及节点失效等问题,提出了一种高效、安全的可信节点间身份认证方案。方案采用基于身份和双线性对理论实现认证密钥协商与更新,通过基于Beta分布的节点行为信誉的管理计算其信任度,利用信任度识别节点是否可信并采用对称密码体制结合信息认证码实现可信节点间认证。方案不仅能防范窃听、注入、重放、拒绝服务等多种外部攻击,而且能够抵御选择性转发、Wormhole攻击、Sinkhole攻击和女巫攻击等内部威胁。与SPINS方案相比,所提方案在同一网络环境下有较长的网络生命期、较小的认证时延、更高的安全性及可扩展性,在无人值守安全性要求较高的WSN领域具有较好的应用价值。 Concerning the vulnerability to attack from external and internal nodes and node failure due to openness and limited resources in Wireless Sensor Network (WSN), an efficient, secure trusted authentication scheme was proposed. The theory of identity-based and bilinear pairings was adopted in the authentication key agreement and update. The node trust value was computed by node behavior reputation management based on Beta distribution. The symmetric cryptosystem combined with message authentication code was used in certification process between trusted nodes which were identified by the trust value. The scheme not only can prevent eavesdropping, injection, replay, denial of service and other external attacks, but also is able to withstand internal threats such as the selective forwarding, Wormhole attack, Sinkhole attack and Sybil attack. The analysis and comparison with SPINS scheme show that the scheme can achieve longer network lifetime, smaller certification delay, greater security and scalability in the same network environment. The scheme has good application value in unattended WSN with high safety requirements.
出处 《计算机应用》 CSCD 北大核心 2013年第7期1842-1845,1857,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61170233 61232018 61272472) 国家自然科学基金青年科学基金资助项目(61202404) 安徽省教育厅自然科学基金资助项目(KJ2013A040 KJ2012B012) 安徽省自然资金资助项目(1308085MF88)
关键词 无线传感器网络 可信认证 节点行为 基于身份 BETA分布 双线性对 Wireless Sensor Network (WSN) trusted authentication node behavior identity-based Beta-distribution bilinear pairing
  • 相关文献

参考文献21

  • 1LUK M, PERRIG A, WHILLOCK B. Seven cardinal properties of sensor network broadcast authentication [ C]// SASN'06: Proceed- ings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2006: 147-156.
  • 2PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: security protocols for sensor networks [ J]. Wireless Networks, 2002, 8(5) : 521 -534.
  • 3WATRO R, KONG D, CUTI S-F, et al. TinyPK: securing sensor networks with public key technology [ C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004:59-64.
  • 4MALAN D J, WELSH M, SMITH M D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [ C] // Proceedings of the 1 st IEEE International Conference on Sen- sor and Ad Hoc Communications and Networks. Piscataway: IEEE Press, 2004:71-80.
  • 5BAUER K, LEE H. A distributed authentication scheme for a wire- less sensing system [ J]. ACM Transactions on Information and Sys- tem Security, 2008, 11(3): 1-35.
  • 6di PIETRO R, SORIENTE C, SPOGNARDI A, et al. Collaborative authentication in unattended WSNs [ C]//WiSec'09: Proceedings of the Second ACM Conference on Wireless Network Security. New York: ACM Press, 2009:237-244.
  • 7BONEH D, FRANKLIN M. Identity-based encryption from the Well pairing [ C]/! Proceedings of the 21st Annual International Cryptolo- gy Conference on Advances in Cryptology. Berlin: Springer-Verlag, 2001:213-229.
  • 8OLIVEIRA L B, DAHAB R, LOPEZ J, et al. Identity-based en- eryption for sensor networks [ C]//Proceedings of the Fifth Annum IEEE IntemationM Conference on Pervasive Computing and Commu- nications Workshops. Piseataway: IEEE Press, 2007:290-294.
  • 9OLIVEIRA L B, SCOTI" M, LOPEZ J, et al. TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sen- sor networks [J]. Computer Communications, 2011, 34(3): 485- 493.
  • 10YASMIN R, RITI'ER E, WANG G. An authentication framework for wireless sensor networks using identity-based signatures [ C]// Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology. Piscataway: IEEE Press, 2010:882-889.

二级参考文献55

共引文献55

同被引文献41

  • 1蒋雅兰,魏慧琴.基于CPK的分布式Mesh网络认证[J].计算机科学,2012,39(S2):65-68. 被引量:3
  • 2南相浩.CPK算法与标识认证[J].信息安全与通信保密,2006,28(9):12-16. 被引量:30
  • 3裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 4PENG N,LIU D. Multilevel uTESLA:a broadcast authentication system for distribution sensor networks[J].ACM Transactions on Embeded Computing Systems,2004,(04):800-836.
  • 5RUAN N,HORI Y. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of things[A].Washington,DC:IEEE Computer Society,2012.60-65.
  • 6VIJAYALAKSHMI B. A zero-knowledge authentication for wireless sensor networks based on congruence[A].Washington,DC:IEEE Computer Society,2011.94-99.
  • 7MANIVANAN D,VIJAYALAKSHMI B,NEELAMEGAM P. An efficient authentication protocol based on congruence for wireless sensor networks[A].Washington,DC:IEEE Computer Society,2011.549-554.
  • 8CHANG Q,ZHANG Y,QIN L. A node authentication protocol based on ECC in WSN[A].Washington,DC:IEEE Computer Society,2010.606-609.
  • 9LI Y,LI J,REN J. Providing hop-by-hop authentication and source privacy in WSN[A].Piscataway,NJ:IEEE Press,2012.3071-3075.
  • 10KHAN S U,KHAN R. An efficient authentication and key establishment scheme for heterogeneous sensor networks[A].Piscataway,NJ:IEEE Press,2011.1-6.

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部