期刊文献+

一种无线传感器网络用户认证与密钥协商协议 被引量:4

A User Authentication and Key Agreement Scheme for Wireless Sensor Networks
下载PDF
导出
摘要 随着无线传感器网络的发展,外部用户可以直接访问传感器内部节点获取信息,因此如何认证外部用户的身份,只允许授权用户获取节点数据,保证传输数据的保密性和完整性,已成为当前无线传感器网络研究的热点问题.本文基于用户口令和智能卡提出一个无线传感器网络用户认证与密钥协商协议,协议中采用哈希和异或运算实现主体的身份认证和密钥协商功能.为了分析协议的安全性,本文扩展了串空间理论,构造了分析无线传感器网络认证与密钥协商协议的形式化方法,证明了协议的安全性.最后,文中分析了协议的执行效率,并与同类协议进行了比较. With the development of wireless sensor networks (WSNs), external users are allowed to access real-time data direcdy from the desired nodes inside WSNs without involving the base station or gateway node ( GW ). How to authenticate user identity that allows only anthorized users to access the data, and maintain the confidentiality and integrity of the data transmission is a hot problem studied in the field of WSNs. In this paper, we propose a user authentication and key agreement scheme for WSNs base on password and smart card. It only has hash and XOR operation in the protocol to realize user authentication and key agreement. In order to analyze the securi- ty of proposed protocols, a formal method is given based on the extended strand spaces. And the analysis proves the correctness of the protocol. Additional, we analyze the performance of the proposed protocol, and compare its performance with some related works.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第10期2340-2344,共5页 Journal of Chinese Computer Systems
基金 四川省教育厅基金项目(11ZB261)资助 四川省科技支撑计划项目(2012FZ0016)资助
关键词 无线传感器网络 认证 密钥协商 智能卡 wireless sensor network authentication key agreement smart card
  • 相关文献

参考文献16

  • 1Benenson Z, Gartner F, Kesdogan O. User authentication in sensor network[C]. Proceedings of Workshop Sensor Network, Lecture Notes Informatics Proceeding Informatics ,2004.
  • 2Watro R, Kong O, Cuti S. TinPK: securing sensor networks with public key technology [C]. Proceedings of ACM Workshop Security of Ad Hoc Sensor Networks,2004:59-64.
  • 3Oas M L. Two-factor user authentication in wireless sensor networks [J]. IEEE Trans. Wireless Comm. 2009,8(3): 1086-1090.
  • 4Wong K, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor network [C]. Proceedings of IEEE International Conf. Sensor Network, Ubiquitous, Trustworthy Computing , IEEE Computer Society, 2006 :244-251.
  • 5Oyang 0 H,Lee M K. Improvement of Das's two-factor authentication protocol in wireless sensor networks [EB/OL]. Cryptology ePrint Archive 2009/631. Online PDF: http://eprint. iacr. org! 2009/631. pdf,2010-02.
  • 6Huang H F, Chang Y F, Liu C H. Enhancement of two-factor user authentication in wireless sensor networks [C]. In Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (lIHMSP' 10) ,2010:27-30.
  • 7Chen T H, Shih W K. A robust mutual authentication protocol for wireless sensor network [J]. Electronics and Telecommunication Research Institute (ETRI) Journal,2010,32(5) :704-712.
  • 8Khan M K, Alghathbar K. Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks" [J]. Sensor,2010,10(3) :2450-2459.
  • 9Xue K, Ma C, Hong P, et al. A temporal-credential- based mutual authentication and key agreement scheme for wireless sensor networks [J/OL ]. Journal of Network and Computer Applications (2012) , doi , 10. 1016/j. jnca. 2012. 05. 010.
  • 10Wang 0, Ma C. On the insecurity of some smart-card- based password authentication schemes for WSN [EB/OL]. Cryptology ePrint Archive 2012/581. Online PDF: http://eprint. iacr. org! 2012/581. pdf, 2012-12.

同被引文献34

  • 1裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 2WANG D, WANG P. On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solu- tions [J]. Computer Networks, 2014, 73:41-57.
  • 3BONNEAU J. The science of guessing: analyzing an anonymized corpus of 70 million passwords [ C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2012:538 -552.
  • 4DAS M. Two-factor user authentication in wireless sensor networks [ J]. IEEE Transactions on Wireless Communications, 2009, 8(3) : 1086 - 1090.
  • 5HE D, GAO Y, CHAN S, et al. An enhanced two-factor user au- thentication scheme in wireless sensor networks [ J]. Ad Hoc Sensor & Wireless Networks, 2010, 10(4): 361-371.
  • 6XUE K, MA C, HONG P, et al. A temporal-credential-based mutu- al authentication and key agreement scheme for wireless sensor net- works [ J]. Journal of Network and Computer Applications, 2012, 36(1): 316-323.
  • 7MESSERGES T S, DABBISH E A, SLOAN R H. Examining smart- card security under the threat of power analysis attacks [ J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.
  • 8KIM T H, KIM C, PARK I. Side channel analysis attacks using AM demodulation on commercial smart cards with seed [ J]. Journal of Systems and Software, 2012, 85( 12): 2899 -2908.
  • 9WANG D, WANG P. Offline dictionary attack on password authen- tication schemes using smart cards [ C]// Proceedings of the 16th Information Security Conference. Berlin: Springer, 2014: 1- 16.
  • 10MA C, WANG D, ZHAO S. Security flaws in two improved remote user authentication schemes using smart cards [ J]. International Journal of Communication Systems, 2014, 27(10) : 2215 -2227.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部