期刊文献+

可证安全的面向无线传感器网络的双因素认证方案 被引量:2

Provably-secure two-factor authentication scheme for wireless sensor network
下载PDF
导出
摘要 随着无线传感器网络的快速发展,对外部用户的身份进行确认已成为获取传感器网络中实时数据所要解决的关键问题。基于Nam提出的首个广泛适用于面向无线传感器网络的双因素认证方案的安全模型,设计了一个新的可证安全的用户认证密钥协商方案。该方案基于椭圆曲线密码体制,达到用户、网关节点及传感器节点之间的双向认证,满足匿名性并建立会话密钥,最后基于ECCDH困难性假设证明了新方案的安全性。与Nam提出的方案相比,在满足安全性的同时,将参与者的计算效率达到最优,更符合资源受限环境及现实应用。 With the development of Wireless Sensor Network (WSN), user authentication in WSN is a critical security issue due to their unattended and hostile deployment in the field. To improve the security of user authentication, a new provably-secure two-factor authentication key exchange scheme based on Nam's first security model was proposed. The proposed scheme was based on elliptic curve cryptography, and it achieved authentication security and user anonymity. The safety of the improved protocol was proved based on ECCDH in the random oracle model. Performance analysis demonstrates that compared to Nam's schemes, the proposal is more efficient, and it is more suited to wireless sensor networks environments.
出处 《计算机应用》 CSCD 北大核心 2015年第10期2877-2882,2890,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61379150 61309016) 河南省自然科学基金资助项目(122102210426) 信息保障技术重点实验室开放课题资助项目(KJ-13-02) "十二五"密码发展基金资助项目(MMJJ201201005)
关键词 无线传感器网络 用户认证 口令 智能卡 可证明安全 Wireless Sensor Network (WSN) user authentication password smart-card provably-secure
  • 相关文献

参考文献1

二级参考文献36

  • 1Awasthi, A., 2004. Comment on a dynamic ID-based remote user authentication scheme. Trans. Cryptol., 1(2):15-17.
  • 2Awasthi, A., Lal, S., 2004. An enhanced remote user au thentication scheme using smart cards. IEEE Trans. Consum. Electron., 50(2):583-586. [doi:10.1109/TCE. 2004.1309430].
  • 3Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing Ro bust User Authentication in Sensor Networks. Proc. Workshop on Real-World Wireless Sensor Networks, p.1-5.
  • 4Chang, C.C., Wu, T.C., 1991. Remote password authenti cation with smart cards. IEE Proc. E Comput. Digit. Tech., 138(3):165-168. [doi:10.1049/ip-e.1991.O022].
  • 5Das, M.L., 2009. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun., 8(3):1086-1090. [doi: 10.1109/TWC.2008.080128].
  • 6Das, M.L., Saxena, A., Gulati, V.P., 2004. A dynamic ID based remote user authentication scheme. IEEE Trans. Consum. Electron., 50(2):629-631. [doi:10.1109/TCE. 2004.1309441].
  • 7Desnoyers, P., Ganesan, D., Shenoy, P., 2005. TSAR: a Two Tier Sensor Storage Architecture Using Interval Skip Graphs. Proc. 3rd Int. Conf. on Embed ded Networked Sensor Systems, p.39-50. [doi:10.1145/ 1098918.1098923].
  • 8Diao, Y., Ganesan, D., Mathur, G., Shenoy, P.J., 2007. Re thinking Data Management for Storage-Centric Sensor Networks. Proc. Conf. on Innovative Data Systems Research, p.22-31.
  • 9Dolev, D., Yao, A., 1983. On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208. [doi: 10.1109/TIT. 1983.1056650].
  • 10Du, W., Deng, J., Han, Y., Varshney, P., 2003. A Pairwise Key Predistribution Scheme for Wireless Sensor Net works. ACM Conf. on Computer and Communications Security, p.42-51.

共引文献7

同被引文献39

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部