期刊文献+

一种适用于异构AdHoc无线传感器网络的身份认证与密钥共识协议 被引量:2

A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks
下载PDF
导出
摘要 随着无线传感器网络的应用越来越广泛,保证通信实体间传输数据的安全变得尤为重要,在对传输数据加密之前,如何达成会话密钥成为了一个紧要问题,需要AKA协议进行保障。文章通过对TAI等人提出的AKA协议进行分析后,发现该协议存在一些问题,用户和传感器节点达成共享密钥后,并不能确定对方身份的真实性,因此,容易受到假冒攻击。文章指出了TAI等人的AKA协议的安全缺陷后,给出了一个改进的AKA协议。新协议对原方案中传感器节点身份信息的提供方式进行改进,将传感器节点提供身份信息改为用户提供身份信息,传感器节点可以通过计算得到用户的身份信息,从而验证通信双方的真实性,有效地避免了假冒攻击,提高了协议的安全性。 With the use of wireless sensor networks becomes more and more wildly, it is very important to ensure the safety of data transmission between communication parties. So how to reach a session key has become a critical issue before encrypting the transmission data. And AKA protocol is used to solve this problem. After analysing TAI et al's AKA protocol, we find that their protocol suffers from such a security flaw. When a user and a sensor node reach the session key, they cannot confirm identity of each other. So their AKA protocol cannot withstand impersonation attack. This paper shows the found security flaws and propose an improvement by changing the method of sensor node identity provides. And the sensor node can also get the user's identity. So the authenticity of the communication parties will be verified. The proposed protocol can resist the impersonation attack effectively and the security is improved.
出处 《信息网络安全》 CSCD 北大核心 2018年第1期23-30,共8页 Netinfo Security
基金 国家自然科学基金[51378350] 天津市应用基础与前沿技术研究计划[15JCYBJC15900]
关键词 无线传感器网络 身份认证 密钥共识 信息安全 wireless sensor networks identity authentication key agreement information security
  • 相关文献

参考文献3

二级参考文献18

  • 1Ritu Sharma, Yogesh Chaba, Yudhvir Singh. Distributed and Grid Computing[C], Proceedings of the 1st International Conference on Parallel. 2010.
  • 2A. Gupta, J. Kuri. Deterministic schemes for key distribution[J].wireless sensor networks, 2008,452-459.
  • 3J. C .Lee, Victor C., M. Leung, Kirk H. Wong, Jiannog Cao, and Henry C. B. Chan. Key Management Issues In Wireless Sensor Networks: Current Proposals And Future Developments[J].IEEE Wireless Commun.2007:76-84.
  • 4Chris Karlof and David Wagner. Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures[C]Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, USA, 2003.113--127.
  • 5Michel Bauderon, Rui Chen and Olivier Ly. Context-Free Categorical Grammars[C].Lecture Notes in Computer Science Volume 5725, 2009.160-171.
  • 6Sungchul Heo, Zeen Kim and Kwangjo Kim. Certificateless Group Key Agreement Protocol For Dyanamic Groups[C]. IEEE GLOBECOM proceedings. 2007.
  • 7S. S. Al-Riyami and K. G. Paterson. Certificateless Public Key Cryptography[C]Proc. of Asiacrypt 2003, LNCS, Vol. 2894, 2003. 452-473.
  • 8Y. W. Law. Key Management and Link Layer Security of WSN[D]. University ofTwente, Netherland. 2005.
  • 9BORAH S, CHETRY S P K, SINGH P K. Hashed-K-Means: A Proposed Intrusion Detection Algorithm[A].Computational Intelligence and Information Technology[M]. Heidelberg Berlin: Springer, 2011:855- 860.
  • 10MA Zhenghui, KABAN A. K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection[C]// UKCI .Computational Intelligence 2013 13th UK Workshop on,September 9-11, 2013, Guildford, UK.Piscataway, NJ, USA: IEEE, 2013:266-271.

共引文献9

同被引文献6

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部