期刊文献+

基于零知识证明的安全认证方案

Security Authentication Scheme Based on Zero Knowledge Proof
下载PDF
导出
摘要 为满足无线传感器网络的安全认证需求,针对传统认证方案中可能遭受的重放、中间人攻击的问题,提出了一种基于零知识证明的安全认证方案。网络中的合法节点与请求认证的节点间运行零知识证明协议,根据请求者的回答来验证请求节点的身份。分析表明,敌手无法从认证中获取关于秘密的信息,方案可以抵抗重放,中间人和节点间的合谋攻击,在能耗上也较小,适合资源受限的无线传感器网络。 In order to satisfy the safety certification requirements of wireless sensor networks, and solve the replay and man in the middle attack problem in traditional authentication, a security authentication scheme based on zero knowledge proof is proposed. In the scheme, the zero knowledge protocol is launched between the request node and the legal nodes, which can identify the identity of the request node according to the answers. It is analyzed that our scheme can resist replay attacks, man in the middle attack and collusion attack, while the attacker cannot gain any information about the secret. The consumption of the scheme is light, which can apply to the source limited wireless sensor networks.
出处 《计算机与数字工程》 2015年第7期1279-1282,共4页 Computer & Digital Engineering
基金 湖北省自然科学基金(编号:2011CDB052) 中国博士后科学基金(编号:2012M512132)资助
关键词 无线传感器网络 零知识证明 安全认证 wireless sensor networks, zero knowledge proof, security authentication
  • 相关文献

参考文献13

  • 1Qiu Y, Zhou J Y, Baek J, et al. Authentication and Key Establishment in Dynamic Wireless Sensor Net- works[J]. Sensors, 2010: 3718-3731.
  • 2Yeh H L, Chan T H, Liu P C, et al. A Secured Au- thentication Protocol for Wireless Sensor Networks U- sing Elliptic Curves Cryptography[J]. Sensors, 2011 : 4767-4779.
  • 3Peng S W. An ID Based multiple authentication schemes against attacks in wireless sensor networks [C//Proceedings of IEEE CCIS, 2012:1436-1439.
  • 4Bauer K, Lee H. A distributed authentication scheme {or a wireless sensing system[C]//Proeeedings of the 2th International Workshop on Networked Sensing Systems, San Diego, 2005 210-215.
  • 5吴世忠,祝世雄,张文政,等译.应用密码学[M].北京:机械工业出版社,2006:71-72.
  • 6汤鹏志,李彪.Schnorr数字签名的零知识证明[J].微电子学与计算机,2012,29(6):177-179. 被引量:4
  • 7王平水.基于零知识证明的签名方案研究[J].计算机工程与设计,2007,28(16):3834-3836. 被引量:2
  • 8舒麟,廖闻剑,彭艳兵.拥有DSA数字签名的零知识证明[J].计算机工程与应用,2011,47(16):120-121. 被引量:3
  • 9Keith S, Lin S. Zero-knowledge proo{s as authentica- tion method in wireless sensor networks[J]. Cryptog- raphy and Network Security Final Project Report, 2007 : 1-5.
  • 10Parbat V, Manikrao T, Tayade N, et al. Zero Knowledge Protocol to design security model for threats in WSN[J2. International Journal of Engi- neering Research and Applications (IJERA), 2012: 1533-1537.

二级参考文献24

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部