期刊文献+

一种具有强匿名性的无线传感器网络访问控制方案 被引量:3

An Access Control Scheme with Strong Anonymity in Wireless Sensor Network
下载PDF
导出
摘要 随着无线传感器网络(WSN)的应用越来越广泛,其访问控制的安全性和隐私问题已成为研究热点。将Hash函数、消息认证码以及椭圆曲线上的点乘计算相结合,提出一种具有强匿名性的WSN访问控制方案。该方案中通信双方相互认证抵抗攻击者的伪造攻击,利用消息认证码来保证数据的完整性;同时以公平的方式生成共享的会话密钥,具有较强的抵抗伪装攻击和抵抗节点捕获攻击的能力。理论分析与评估结果表明,该方案通过引入强匿名的节点请求,实现节点请求的不相关性,增强抵抗节点捕获攻击的能力。将Hash函数与消息认证码相结合,在相同阶的计算复杂度下不增加通信成本,增强系统的安全性。 With the wide application of Wireless Sensor Networks(WSN),it attracts increasing attention and its security and privacy concerns of access control are becoming important research issues. This paper proposes an access control scheme with strong anonymity by utilizing a Hash function,the message authentication code and the point multiplication calculation on an elliptic curve. It uses mutual authentication in both communication sides to resist the forgery attacks,and uses the message authentication code to ensure data integrity. Meanwhile,it generates the share session key in a fair way and has a strong resistance to node capture attacks. Theoretical analysis and evaluation result shows that the scheme achieves the uncorrelated requests between nodes by introducing node requests with strong anonymity,which can enhance the ability to resist the node capture attacks. In particular,compared with the existing schemes,combining the message authentication code with the Hash function,it is more secure and efficient in the same order of computational complexity and without increasing the cost of communication.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第1期126-129,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61373125 61272415 61070164) 广东省自然科学基金资助项目(S2011010002708 2010B090400164) 暨南大学科技创新基金资助项目(11611510)
关键词 无线传感器网络 访问控制 强匿名性 认证 安全 Wireless Sensor Network(WSN) access control strong anonymity authentication security
  • 相关文献

参考文献12

  • 1Akyildiz F,Su Weilian,Sankarasubramaniam Y,et al.Wireless Sensor Network:A Survey[J].Computer Networks,2002,38(4):393-422.
  • 2任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1708
  • 3米波,曹建秋,段书凯,王勇.无线传感器网络密钥管理问题综述[J].计算机工程与应用,2011,47(13):77-82. 被引量:8
  • 4Nachman L,Huang J,Shahabdeen J,et al.IMOTE2:Serious Computation at the Edge[C]//Proceedings of Wireless Communications and Mobile Computing Conference.[S.1.]:IEEE Press,2008:1118-1123.
  • 5Eschenauer L,Gligorv D.A Key-management Scheme for Distributed Sensor Networks[C]//Proceedings of the9th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2002:41-47.
  • 6Chan H W,Perrig A,Song D.Random Key Predistribution Schemes for Sensor Networks[C]//Proceedings of IEEE Symposium on Security and Privacy.[S.1.]:IEEE Press,2003:197-213.
  • 7Choi S J,Youn H Y.An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks[C]//Proceedings of Workshops on Embedded and Ubiquitous Computing.Berlin,Germany:Springer-Verlag,2005:1088-1097.
  • 8Park C W,Choi S J,Youn H Y.A Noble Key Predistribution SScheme with LU Matrix for Secure Wireless Sensor Networks[C]//Proceedings of International Conference on Computational Intelligence and Security.Berlin,Germany:Springer-Verlag,2005:494-499.
  • 9Zhou Yun,Zhang Yanchao,Fang Yuguang.Access Control in Wireless Sensor Networks[J].Ad Hoc Networks,2007,5(1):3-13.
  • 10Huang H F.A Novel Access Control Protocol for Secure Sensor Networks[J].Computer Standards&Interfaces,2009,31(3):272-276.

二级参考文献57

  • 1李志军,秦志光,王佳昊.无线传感器网络密钥分配协议研究[J].计算机科学,2006,33(2):87-91. 被引量:9
  • 2胡德发,李乔良.无线传感器网络密钥分发方案研究[J].计算机应用研究,2007,24(1):155-157. 被引量:2
  • 3黄鑫阳,杨明.无线传感器网络密钥管理研究综述[J].计算机应用研究,2007,24(3):10-15. 被引量:19
  • 4Liu D,Ning P.Location-based pairwise key establishments for static sensor networks[C] //Proe of the 1st ACM Workshop on Soeurity of Ad Hoe and Sensor Networks.New York:ACM Press,2003:72-82.
  • 5Dini G,Savino I.S2RP:A secure and scalable rekeying protocol for wireless sensor networks[C] //IEEE Proceedings of MASS 2006,2006.
  • 6Ten emerging technologies that will change the world[J].Technology Review,2003,106(1):22-49.
  • 7Akyildiz I F,Su W,Sankarasubramaniam Y,et al.A survey on sensor networks[J].IEEE Communications Magazine,2002,40(8):102-114.
  • 8Chen H,Perrig A,Song D.Random key predistribution schemes for sensor networks[C] //Proceedings of IEEE Symposiurn on Security and Privacy(SP'03),2003:197-213.
  • 9Carman D W,Krons P S,Matt B J.Constraints and approaches for distributed sensor network security,NAI Labs Technical Report #00-010[R].2000.
  • 10Perrig A,Szewczyk R,Wen V,et al.SPINS:Security protocols for sensor networks[J].Wireless Networks,2002,8(5):521-534.

共引文献1712

同被引文献34

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部