期刊文献+

无线传感器网络用户认证协议研究进展 被引量:5

Survey on user authentication protocol in wireless sensor network
下载PDF
导出
摘要 无线传感器网络(WSN,wireless sensor network)用户认证技术是传感器网络验证用户的合法性以避免网络数据信息泄露的有效手段之一,同时,用户也需验证传感器网络的合法性,避免获得错误或虚假数据信息。由于WSN节点能量、通信和计算能力等资源受限,且通常部署在敌对或无人值守的区域,因此传统用户认证协议并不完全适用于WSN。从WSN认证协议的安全攻击入手,给出其安全需求及理论基础,归纳总结了设计流程,针对其安全性分析,描述了安全攻击模型,并综述了形式化分析验证工具AVISPA体系结构和HLPSL语言构成。评述了当前的各种WSN用户认证协议,建议了未来研究方向,这些研究工作将有助于WSN用户认证协议的设计、分析与优化。 In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. However, since the sensor nodes have limited energy, communications and computing capacity, and they are usually deployed in hostile or unattended environment, the traditional user authentication protocol (UAP) is not entirely suitable for WSN. The security attacks were introduced for the UAP in WSN, its secure requirements and the theoretical foundation were given, and then the UAP's design processes were summarized. For the analysis of its security, the attack model was described, and the automated validation of intemet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. Then, the current UAPs were reviewed in WSN, the future research directions were proposed. These researches will contribute to the design, analysis and optimization for the UAP in WSN.
作者 房卫东 张武雄 单联海 何为 陈伟 FANG Wei-dong ZHANG Wu-xiong SHAN Lian-hai HE Wei CHEN Wei(Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Mierosystem and Information Technology, Chinese Academy of Sciences, Shanghai 200051, China Shanghai Research Center for Wireless Communication, Shanghai 201210, China Shanghai Internet of Things Co., Ltd, Shanghai 201899, China School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China)
出处 《网络与信息安全学报》 2017年第1期1-12,共12页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61471346) 上海市自然科学基金资助项目(No.14ZR1439700) 国家科技重大专项基金资助项目(No.2014ZX03005001) 上海市科技重大基金资助项目(No.15DZ1100400) 中国科学院科技服务网络计划基金资助项目(No.kfj-sw-sts-155) 国家自然科学基金委员会-山西省人民政府煤基低碳联合基金资助项目(No.U1510115)~~
关键词 无线传感器网络 安全性 用户认证协议 双因素 三因素 WSN, security, user authentication protocol, two-factors, three-factors
  • 相关文献

参考文献3

二级参考文献56

  • 1SHENG Hao 1,ZHAO HuiJie 1,HUANG Jian 2 & LI Na 1 1 School of Instrument Science and Opto-Electro Engineering,Beihang University,Beijing 100191,China,2 School of Software,Beihang University,Beijing 100191,China.A spatio-velocity model based semantic event detection algorithm for traffic surveillance video[J].Science China(Technological Sciences),2010,53(S1):120-125. 被引量:2
  • 2Chong C Y, Kumar S. Sensor networks: Evolution, opportunities and challenges[J]. Proceedings of IEEE, 2003, 91(8): 1247-1256.
  • 3Li C T. An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards[C]//The 5th International Conference on Information Assurance and Security, Xi'an: IEEE Computer Society, 2009 517-520.
  • 4Hwang M S, Liu C Y. Authenticated encryption schemes: Current status and key issues[J]. International Journal of Network Security, 2005, 1(2): 61-73.
  • 5Kim M, Koc C K. A simple attack on a recently introduced hash-based strong-password authentication scheme[J]. International Journal of Network Security, 2005, 1(2): 77-80.
  • 6Lee N Y, Chiu Y C. Improved remote authentication scheme with smart card[J]. Computer Standards and Interfaces, 2005, 27(2): 177-180.
  • 7Daemen J, Rijndael R V. The advanced encryption standard[J]. Dr. Dobb' s Journal, 2001,26(3): 137-139.
  • 8Khan M K, Zhang J. Improving the security of a flexible biometrics remote user authentication scheme[J]. Computer Standards and Interfaces, 2007, 29(1): 82-85.
  • 9Khan M K, Zhang J, Wang X. Chaotic Hash-based fingerprint biometric remote user authentication scheme on mobile devices[J]. Chaos, Solitons and Fractals, 2008, 35(3): 519-524.
  • 10Li C T, Hwang M S. An efficient biometrics-based remote user authentication scheme using smart cards[J]. Journal of Network and Computer Applications, 2010, 33(1): 1-5.

共引文献25

同被引文献18

引证文献5

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部