期刊文献+

一种物联网密钥管理和认证方案 被引量:4

A New Scheme of Key Management and Authentication for IOT
下载PDF
导出
摘要 针对物联网环境中不同网络间交互所带来的数据隐私和认证等安全问题,本文提出一种密钥管理和认证签名方案,并进行性能和安全性分析,以证明方案能满足物联网低资源、高交互率、高移动率、低数据量环境下通信安全性要求。通过研究基于身份认证的密钥协商方案,加入三方认证模式,实现密钥身份认证。仿真实验结果验证了方案的有效性。 The paper notes a new scheme of key management and authentication for IOT to solve the security issues , like the date privacy during the communication and the authentication question .Through the program and protocol performance and security a-nalysis, the results show that the scheme can better meet low resource , high interaction rates, high mobility, low data volume en-vironments and the communication protocol security requirements .Through research-based public key authentication key agree-ment protocol , the scheme adds a tripartite authentication mode to achieve a valid key authentication .
出处 《计算机与现代化》 2014年第12期91-96,112,共7页 Computer and Modernization
基金 国家自然科学基金资助项目(61272419)
关键词 通信安全 物联网 密钥管理 身份认证 communications security IOT key management authentication
  • 相关文献

参考文献15

  • 1Watro R, Kong D, Cuti S, et al. TinyPK: Securing sensor networks with public key technology[C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2004:59-64.
  • 2Wong K H M, Zheng Yuan, Cao Jiannong, et al. A dynamic user authentication scheme for wireless sensor networks[C]// Proceedings of the 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06). 2006,1:244-251.
  • 3Das A K, Sharma P, Chatterjee S, et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks[J].Journal of Network and Computer Applications, 2012,35(5):1646-1656.
  • 4Vaidya B, Makrakis D, Mouftah H T. Improved two-factor user authentication in wireless sensor networks[C]// Proceedings of the 6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. 2010:600-606.
  • 5He Daojing, Gao Yi, Chan S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks[J].International Journal of Ad Hoc & Sensor Wireless Networks, 2010,10(4):361-371.
  • 6Huang Hui-Feng, Chang Ya-Fen, Liu Chun-Hung. Enhancement of two-factor user authentication in wireless sensor networks[C]// Proceedings of the 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). 2010:27-30.
  • 7Khan M K, Alghathbar K. Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’[J].Sensors, 2010,10(3):2450-2459.
  • 8Xue Kaiping, Ma Changsha, Hong Peilin, et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J].Journal of Network and Computer Applications, 2013,36(1):316-323.
  • 9杨庚,程宏兵.一种有效的无线传感器网络密钥协商方案[J].电子学报,2008,36(7):1389-1395. 被引量:11
  • 10Zhang Yuanyuan, Gu Dawu, Li Juanru. Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks[J].Computer Communications, 2008,31(13):2959-2971.

二级参考文献18

  • 1陈菲,宋志高,陈克非.无线传感器网络中对密钥管理评估指标研究[J].计算机仿真,2005,22(5):137-140. 被引量:17
  • 2杨少春,郎为民,谭珂科.基于密钥预分配的传感器网络加密方案[J].信息工程大学学报,2005,6(4):11-14. 被引量:5
  • 3王佳昊,王胜坤,秦志光,李志军.随机预分配密钥在WSN跟踪算法中的应用[J].四川大学学报(工程科学版),2005,37(6):113-119. 被引量:6
  • 4Cheng H B, Yang G, Wang J T, Huang X.An authenticated identity-based key establishment and encryption scheme for wireless sensor networks[ J]. The Journal of China University of Posts and telecommunications,2006,13(2):31 - 38.
  • 5Malan D J,Welsh M, Smith M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[ A]. The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California[ C ]. October 2004.71 - 79.
  • 6Du W Wang, NING P. An efficient scheme for authenticating public keys in sensor networks[ A]. MobiHoc' 05[ C]. Urbana Champaign, Illinois, USA, May 25 - 27,2005.58 - 67.
  • 7Wander A S, Gura N, Eberle H, et al. Energy analysis of public-key cryptography for wireless sensor networks[ A]. Proc of the 3rd International Conference on Pervasive Computing and Commtmications[C]. Kauai Island, USA, Mar 8- 12,2005. 324 - 328.
  • 8Shamir A. Identity-based cryptography and signature schemes [ J]. Advances in Computer Science, 1985,196:47 - 53.
  • 9Boneh D,Franklin M, Identity-based encryption from the Weil pairing[ A ]. Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science[ C] .2001.213 - 229.
  • 10Kalpakis K, Dasgupta K, Namjoshi P. Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks.ACM Computer Networks[J] .2003,42(6): 697-716.

共引文献10

同被引文献37

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部