期刊文献+

基于动态会话密钥的传感器网络双向认证方案 被引量:4

Mutual authentication scheme based on session key in wireless sensor network
下载PDF
导出
摘要 无线传感器网络中大量节点都部署在不安全的环境中,为确保传感器节点提供数据信息服务时对隐私信息的保护,即仅为合法查询者提供数据查询服务,提出一种基于动态会话密钥的双向认证方案。方案中综合采用时间戳、hash函数和随机数等技术手段设计动态会话密钥,并使用祖冲之加密算法对查询请求信息加密和提供信息完整性认证,能够实现数据机密性、完整性和双向认证等安全功能。为验证所提方案的系统性能,搭建了由TelosB节点和网关构成的传感网实验系统并部署了相关实验。实验结果表明,感知节点和网关之间可互相认证且认证时间较短,并能抵御假冒攻击、信息重放、DoS攻击等传感网常见攻击。 This paper focused on a sensor network deployed over an insecure environment,which was expected to provide data service with sound preserving of user privacy. To this end,this paper proposed a mutual authentication protocol between sensor nodes and gateway nodes. This scheme adopted multiple security techniques against different security threats,such as timestamps against replay attacks,the ZUC encryption algorithm against data eavesdropping and unauthorized falsification. To verify the effectiveness and efficiency of this scheme,it implemented a TelosB-based wireless sensor testbed,in which all sensor nodes were equipped with this security scheme to facilitate mutual authentications between each other. The experiment results reveal that,this algorithm can not only resist the common attacks,such as the impersonation attack,replay attack and DoS attacks,but also show a sound network performance.
出处 《计算机应用研究》 CSCD 北大核心 2014年第8期2506-2509,共4页 Application Research of Computers
基金 新疆维吾尔自治区自然科学基金资助项目(2013211A012)
关键词 无线传感器网络 双向认证 会话密钥 TelosB节点 wireless sensor network(WSN) mutual authentication session key TelosB node
  • 相关文献

参考文献19

  • 1BENENSON Z, FREILING F, HAMMERSCHMIDT E, et al. Authen- ticated query flooding in sensor networks [ C ]//Proc of the 21 st Inter- national Conference on Information Security. Berlin:Springer, 2006: 38-49.
  • 2江灿明,徐海霞,李宝.无线传感器网络的分布式用户认证机制[J].中国科学院研究生院学报,2008,25(1):80-85. 被引量:4
  • 3WANG Hao-dong, LI Qun. Achieving distributed user access control in sensor networks [ J ]. Ad hoc Networks,2012,10 ( 3 ) :272-283.
  • 4WONG K H, ZHENG Yuan, CAO Jian-nong, et al. A dynamic user authentication scheme for wireless sensor networks [ C ]//Proc of IEEE International Conference on Sensor Networks, Ubiquitous, and Trust- worthy Computing. Washington DC : IEEE Computer Society, 2006 : 244 -251.
  • 5DAS M L. Two-factor user authentication in wireless sensor networks [J]. IEEE Trans on Wireless Communications, 2009,8 (3): 1086-1090.
  • 6ARIKUMAR K S,THIRUMOORTHY K. Improved user authentication in wireless sensor networks[ C ]//Proc of International Conference on Emerging Trends in Electrical and Computer Technology. 2011.
  • 7杜志强,沈玉龙,马建峰,周利华.基于信息覆盖的无线传感器网络访问控制机制[J].通信学报,2010,31(2):113-119. 被引量:5
  • 8SHEN Yu-long, MA Jian-feng, PEI Qing-qi. An access control scheme in wireless sensor networks [ C ]//Proc of IFIP International Conference on Network and Parallel Computing. Washington DC : IEEE Computer Society,2007:362-367.
  • 9REN Kui, LOU Wen-jing, ZENG Kai, et al. On broadcast authentica- tion in wireless sensor networks [ J]. IEEE Trans on Wireless Communications ,2007,6( 11 ) :4136-4144.
  • 10CAO Xue-fei, KOU Wei-dong, DANG Lan-jun,et al. IMBAS:identi- ty-based multi-user broadcast authentication in wireless sensor net- works [ J]. Computer Communications ,2008,31 (4) :659-667.

二级参考文献25

  • 1BENENSON Z, GARTNER F C, KESDOGAN D. An algorithmic framework for robust access control in wireless sensor networks[A]. Second European Workshop on Wireless Sensor Networks[C]. 2005.158-165.
  • 2BENENSON Z, GEDICKE N, RAIVIO O. Realizing robust user authentication in sensor networks[A]. Workshop on Real-World Wireless Sensor Networks[C]. Stockholm Sweden, 2005. 135-142.
  • 3BENENSON Z. Authenticated querying in sensor networks[A]. Per- Corn Workshops 2006[C]. Karlstad Sweden, 2006.644-647.
  • 4JIANG C M, L1. B, XU H X. An efficient scheme for user authentication in wireless sensor networks[A]. 21st International Conference on Advanced Intormation Networking and Applications Workshops[C]. Niagara Falls, Canada, 2007.438-442.
  • 5WANG H, LI Q. Distributed user access control in sensor networks[A]. IEEE International Conference on Distributed Computing in Sensor Systems[C]. San Francisco, CA. USA, 2006. 305-320.
  • 6BANERJEE S, MUKHOPADHYAY D. Symmetric key based authenticated querying in wireless sensor networks[A]. Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks[C]. Nice France, 2006.
  • 7ZHANG W S, SONG H, CAO G H. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks[A]. MobiHoc'05[C]. 2005. 378-389.
  • 8MACCARI L, MAINARDI L, MARCHITT M A, et al. Lightweight, distributed access control lot wireless sensor networks supporting mobility[A]. ICC '08[C]. 2008. 1441-1445.
  • 9YOON S, LEE H, JI S, et al. A user authentication scheme with privacy protection for wireless sensor networks[A]. The 2nd Joint Workshop on Information Security[C]. Tokyo, Japan, 2007.
  • 10WONG K H, ZHENG Y. CAO J N, et al. A dynamic user authentication scheme for wireless sensor networks[A]. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trust- worthy Computing[C]. 2006. 244-251.

共引文献6

同被引文献27

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部