期刊文献+

基于三因素节点评估的WSN安全认证方案

Secure Authentication Scheme of WSN Based on Tri-element Node Evaluation
下载PDF
导出
摘要 为减少传感器节点的资源利用率并提高网络安全性,提出一种新的无线传感器网络认证方案。在计算节点信任度时通过引入时间片、安全行动系数和交互频度计算节点信任度,防止自私节点伪装成正常节点,使信任度与当前节点行为紧密相关,避免节点通过很少的交易次数达到较高的信任度。设计身份标识、密码、智能卡相结合的认证方案,用户在与传感器节点认证之前,网关通过查询节点的信任度找到可信的节点与用户进行认证,实现可信的传感器节点、网关节点和用户三者之间的交互认证,并且使用户能方便地更改密码。分析和仿真结果表明,与现有用户认证方案相比,该方案能够抵制重放攻击、内部攻击、伪装攻击,同时计算花费少,适用于对安全性和性能要求较高的无线传感器网络。 To reduce the resource use of sensors and enhance the security of Wireless Sensor Network(WSN),a trust-based authentication scheme is proposed and it calculates the node trust by introducing the time slice,the coefficient of safety operations and the frequency of interaction.This makes it difficult for selfish nodes to masquerade as normal nodes,makes trust behavior closely related to the current node,and prevents nodes from achieving higher trust through few trades.Then through combining the identification,the password and the smart card,a user authentication scheme is designed.Before the user authenticates with the sensor node,the gateway node needs to query the trust of nodes and find the trusted node.The optimized certification scheme is used to realize the interaction among nodes,gateway nodes and user can change the password easily.The safety analysis,the performance analysis and the result of the simulation show that,compared with the previous proposed user authentication schemes,this scheme can resist replay attack,inside attack,masquerading,etc.Meanwhile,it costs little time.Thus,this scheme is suitable for WSN which has a high request for the security and performance.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第8期115-119,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61300170) 安徽省教育厅基金资助重点项目(KJ2013A040) 安徽省自然科学基金资助项目(1308085MF88) 安徽工程大学青年基金资助项目(2013YQ28 2012YQ31)
关键词 无线传感器网络 安全行动系数 交互频度 时间片 认证 节点信任度 Wireless Sensor Network(WSN) coefficient of safety operations frequency of interaction time slice authentication node confidence degree
  • 相关文献

参考文献15

  • 1向亦宏,朱燕民.无线传感器网络中高效建立干扰模型的研究[J].计算机工程,2014,40(8):1-5. 被引量:9
  • 2Watro R, Kong D, Cuti S, et al. TinyPK : Securing Sensor Networks with Public Key Technology [ C l//Proc- eedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York, USA: ACM Press,2004:59-64.
  • 3Wong K H M, Zheng uan, Cao Jiannong, et al. A Dynamic User Authentication Scheme for Wireless Sensor Networks[ C ]//Proceedings of IEEE Conference on Sensor Networks, Ubiquitous, and Trustworthy Com- puting. Washington D. C. , USA : IEEE Press, 2006 : 1-8.
  • 4Das M L. Two-factor User Authentication in Wireless Sensor Networks [ J ]. IEEE Transactions on Wireless Communications ,2009,8 ( 3 ) : 1086-1090.
  • 5Chen T H, Shih W K. A Robust Mutual Authentication Protocol for Wireless Sensor Networks[ J]. ETRI Journal, 2010,32(5) :704-712.
  • 6Kumar P, Choudhury A J, Sain M, et al. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks[ J]. Sensors ,2011 , 11 ( 5 ) :5020-5046.
  • 7Qi Aiqin, Shen Yongjun. An Authentication Protocol Based on Chinese Remainder Theorem in Wireless Sensor Networks [ C ]//Proceedings of IEEE Conference Antho- logy. Washington D. C. , USA : IEEE Press,2013 : 1-3.
  • 8马力,郑国宁,孙朋.节点信任度模型的算法研究与设计[J].计算机科学,2012,39(B06):81-85. 被引量:4
  • 9Gu Chengjie, Zhang Shunyi, Feng Huibin, et al. A Novel Trust Management Model for P2P Network with Reputation and Risk Evaluation [ C ]//Proceedings of ICEE ' 10. Washington D. C. ,USA:IEEE Press,2010:3544-3547.
  • 10Wu Guowei, Du Zhuang, Hu Yibo, et al. A Dynamic Trust Model Exploiting the Time Slice in WSNs [ J ]. Soft Computing, 2014,18 ( 9 ) : 1829-1840.

二级参考文献21

  • 1戚文静,张素,于承新,赵莉.几种身份认证技术的比较及其发展方向[J].山东建筑工程学院学报,2004,19(2):84-87. 被引量:18
  • 2张仕斌,何大可.Fuzzy Model for Trust Evaluation[J].Journal of Southwest Jiaotong University(English Edition),2006,14(1):23-28. 被引量:7
  • 3徐兰芳,张大圣,徐凤鸣.基于灰色系统理论的主观信任模型[J].小型微型计算机系统,2007,28(5):801-804. 被引量:20
  • 4龙毅宏.可信计算中的数字证书[Z].Netinfo Security,2004.
  • 5Manchala D W. Trust metrics, models and protocols for electronic commerce transactions [C]//Inthe 18th International Conference on Distributed Computing Systems. 1998:3-12.
  • 6Sharma G,Mazumdar R,Shroff N.On the Complexity of Scheduling in Wireless Networks[C]//Proceedings of MobiCom' 06.Los Angeles,USA:ACM Press,2006:227-238.
  • 7Alicherry M,Bhatia R,Li L E.Joint Channel Assignment and Routing for Throughput Optimization in Multi-radio Wireless Mesh Networks[C]//Proceedings of MobiCom' 05.Cologne,Germany:ACM Press,2005:58-72.
  • 8Gupta P,Kumar P R.The Capacity of Wireless Networks[J].IEEE Transactions on Information Theory,2000,46 (2):388-404.
  • 9Zhao J,Govindan R.Understanding Packet Delivery Performance in Dense Wireless Sensor Networks[C]// Proceedings of SenSys' 03.Los Angeles,USA:ACM Press,2003:1-13.
  • 10Son D,Krishnamachari B,Heidemann J.Experimental Study of Concurrent Transmission in Wireless Sensor Networks[C]//Proceedings of SenSys ' 06.Boulder,USA:ACM Press,2006:237-250.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部