期刊文献+

WSNs中基于Chebyshev多项式的可认证密钥协商方案 被引量:3

An Authenticated Key Agreement Scheme Based on Chebyshev Polynomials in WSNs
下载PDF
导出
摘要 无线传感器网络中节点之间的通信在整个网络中有着重要地位,其安全性也逐渐受到关注.本文基于Chebyshev多项式提出了一种节点之间可认证的非对称密钥协商方案,利用Chebyshev多项式的半群特性和计算上的单向性设计会话密钥机制完成节点之间的认证功能,分析结果表明本文方案可以抵御无线传感网中的典型攻击. Communication between nodes play an important role in the wireless sensor network, its security is also receiving attention gradually.An asymmetric authenticated key agreement based on Chebyshev polynomial between sensor nodes was proposed in this paper. Our schema designed by the semi-group property and the one-way trapped characteristic of Chebyshev polynomial. The analytical results show that:the proposed scheme can resist the typical attacks in wireless sensor network.
出处 《新疆大学学报(自然科学版)》 CAS 北大核心 2015年第1期6-10,共5页 Journal of Xinjiang University(Natural Science Edition)
基金 国家自然科学基金(61471311)
关键词 CHEBYSHEV多项式 WSNS 安全技术 密钥协商 认证 Chebyshev polynomials WSNs security technology key agreement authentication
  • 相关文献

参考文献9

  • 1Wang Ming-wei, Wang Lie-jun, Yang Qing-hua, et al. Realizing a mutual authentication scheme base on telosb in wireless sensor networks[J]. JQurnal of Software Engineering, 2014, 8(3): 194-202.
  • 2Oliveira L B,Scott M,Lopez J,et al.TinyPBC:Palrings for authenticated identity-based non-interactive key distribution in sensor networks[C].INSS 2008-5th International Conference on Networked Sensing Systems,2008-June 17-19,2008,173-180.
  • 3Jiang Rong-rong, Chen Tie-ming. A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor Networks[C]. Computational Intelligence and Security (CIS), 2011 Seventh International Conference on, 2011, 670-673.
  • 4Khan M K, Alghathbar K. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'[J]. Sensors, 2010, 10(3): 2450-2459.
  • 5Chen Yan-bin, Jiang Qiong-xi, Gong Li-hua, et al. Key agreement protocol based on Chebyshev polynomials for wireless sensor network[J]. Journal of Computational Information Systems, 2014, 10(2): 589-594.
  • 6Li Zhi-hui, Cui Yi-dong, Jin Yue-hui,et al. Parameter Selectioon in Public Key Cryptosystem Based on Chebyshev Poly- nomials over Finite Field[J]. Journal of Communications, 2011 6(5):400-408.
  • 7LI Zhi-hui,CUI Yi-dong,XU Hui-min.Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field[J].The Journal of China Universities of Posts and Telecommunications,2011,18(2):86-93. 被引量:3
  • 8刘亮,刘云,宁红宙.公钥体系中Chebyshev多项式的改进[J].北京交通大学学报,2005,29(5):56-59. 被引量:11
  • 9杨清华,汪烈军,刘琦.WSNs中基于秘密共享的身份认证协议[J].激光杂志,2014,35(5):39-41. 被引量:4

二级参考文献28

  • 1刘连浩,申勇.椭圆曲线密码体制中标量乘法的快速算法[J].计算机应用研究,2009,26(3):1104-1108. 被引量:12
  • 2许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 3Kocarev L. Chaos-based cryptography: A brief overview. IEEE Circuits and Systems Magazine, 2001, 1(3): 6-21.
  • 4pareek N K, Patidar V, Sud K K. A random bit generator using chaotic maps. International Journal of Network Security, 2010, 10 (1): 32-38.
  • 5He B, Luo L Y, Xiao D. A method for generating S-box based on iterating chaotic maps. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2010, 22 (1): 89-93 (in Chinese).
  • 6Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps. Proceedings of the International Symposium on Circuits and Systems (ISCAS'03), Vol 3, May 25-28, 2003, Bangkok, Thailand. Los Alamitos, CA, USA: IEEE Computer Society, 2003:28-31.
  • 7Bergamo P, D'Arco P, Santis A D, et al. Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I: Regular Papers, 2005, 52(7): 1382-1393.
  • 8Fee G J, Monagan M B. Cryptography using Chebyshev polynomials. Proceedings of the Maple Summer Workshop (MSW'04), Jul 11-14, 2004, Burnaby, Canada. 2004: 15p.
  • 9KocarevL, Tasev Z, Amato P, et al. Encryption process employing chaotic maps and digital signature process. United States Patent 6892940. 2005.
  • 10Kocarev L, Makraduli J, Amato P. Public-key encryption based on Chebyshev polynomials. Circuits, Systems, and Signal Processing, 2005, 24(5): 497-571.

共引文献15

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部