期刊文献+

一种WSN小数据分发安全方案的研究与设计 被引量:3

RESEARCH AND DESIGN OF A WSN SMALL DATA DISTRIBUTION SECURITY SCHEME
下载PDF
导出
摘要 提出一种无线传感器网络WSN(Wireless Sensor Network)小数据分发安全的方案,用以解决WSN中节点相关参数更新的安全问题。该方案使用基于TCP SYN-Cookie改进的双向认证技术,密钥协商以及LED轻量级加密算法,实现普通节点和簇头节点之间通信的安全。该方案和同量级方案在安全性、计算效率以及存储效率方面进行比较,安全性和效率都更高。并且,该方案能够使WSN中小数据分发的安全问题得到更加有效的解决,使WSN能够抵御DDOS攻击以及中间人攻击。 This paper presented a scheme of small data distribution security in Wireless Sensor Network( WSN) to solve the security problem of node-related parameter update in WSN. This scheme used the improved two-way authentication technology based on TCP SYN-Cookie,key agreement and LED lightweight encryption algorithm to realize the communication between common node and cluster head node. By analyzing the security of the scheme,the efficiency of the calculation and the efficiency of the storage,the scheme had higher security and efficiency than other similar programs. Moreover,the solution could effectively solve the security problem of distributing the small data in the WSN,so that the WSN could resist DDOS attacks and man-in-the-middle attacks.
出处 《计算机应用与软件》 北大核心 2018年第2期150-155,共6页 Computer Applications and Software
关键词 TCPSYNCookieLED 双向认证 密钥协商 小数据分发 TCP SYN-Cookie LED Two-way authentication Key negotiation Small data distribution
  • 相关文献

参考文献2

二级参考文献12

  • 1王潮 朱美丽 时向勇.基于ECC的CBTC无线接入安全认证架构研究.哈尔滨工业大学学报(增刊),2009,41:193-197.
  • 2GERLA M. Ad Hoc Networks: Technologies and Protocols[M]. Springer Science Press,2004.
  • 3王潮,张振华,应仲平.WSN中基于身份的分散密钥管理研究[A].第六届中国测试学术会议论文集[c].2010.
  • 4IBRIQ J, MAHGOUB I. A hierarchical key establishment scheme for wireless sensor networks[C]. AINA'07[C]. Niagara Falls, Canada, 2007.210-219.
  • 5FANTACCI R, CHITI F, MACCARI L. Fast distributed bi-directional authentication for wireless sensor networks [J]. Security and Communication Networks, 2008, 1(l): 17-24.
  • 6HAN K, SHON T, KIM K. Efficient mobile sensor authentication in smart home and WPAN [J]. IEEE Transactions on Consumer Electronics, 2010, 56(2): 591-596.
  • 7HAN K, KIM K, SHON T. Untraceable mobile node authentication in WSN[J]. Sensors, 2010, 10(5): 4410-4429.
  • 8OKEYA K, SAKURAI K. A scalar multiplication algorithm with recovery of y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystem[J]. IEICE Trans Fundamental, 2002, 85(1): 84-93.
  • 9FUTA Y, OHMORI M. Efficient scalar multiplication on Montgomery-form elliptic curves[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004,87(8): 2126-2136.
  • 10LIU D, DAI Y Q. The algorithm of computing kP+mQ+IR on a Montgomery-form elliptic curve[A]. Chinese National Conference of Computer 2003[C]. Beijing: Tsinghua University Press,2003. 198-203.

共引文献21

同被引文献20

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部