期刊文献+

一种分簇无线传感网轻量级匿名认证及密钥协商方案 被引量:2

A Lightweight Anonymous Authentication and Key Negotiation Scheme for Clustered WSN
原文传递
导出
摘要 针对分簇无线传感网中的节点认证问题,使用轻量级的哈希函数和异或运算,设计了一种节点认证及密钥协商方案,将匿名机制引入节点认证过程中,保护了节点隐私安全,提高了网络抵御流量分析攻击的能力.对认证方案抗攻击性能和资源开销的对比分析结果表明,提出的方案可以提供良好的安全认证,并具有较低的计算、存储和通信开销. Focusing on the nodes authentication problem of clustered wireless sensor network,the paper proposes a lightweight authentication and key negotiation scheme using hash function and exclusive or( XOR) operation. The anonymity mechanism is introduced into the authentication process,which can thwart the traffic analysis attacks,and protect the privacy of nodes. In addition,by analyzing and comparing the anti-attack performance and the resource overhead of the authentication scheme,the results show that the proposed scheme can provide good authentication and also have a lower overhead at the cost of computation,storage and communication.
作者 石乐义 崔玉文 付文静 陈鸿龙 SHI Le-yi;CUI Yu-wen;FU Wen-jing;CHEN Hong-long(College of Computer and Communication Engineering, China University of Petroleum ( East China) , Shandong Qingdao 266580, China;Shanghai Key Laboratory of Financial Information Technology, Shanghai University of Finance and Economics, Shanghai 200433, China;College of Information and Control Engineering, China University of Petroleum (East China), Shandong Qingdao 266580, China)
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2018年第2期21-26,共6页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61772551) 上海市金融信息重点实验室开放课题
关键词 分簇无线传感网 认证 密钥协商 匿名 clustered wireless sensor network authentication key negotiation anonymity
  • 相关文献

参考文献1

二级参考文献10

  • 1Akyildiz Wireless F, Su Weilian, Sankarasubramaniam Sensor Network: A Survey[J] Networks, 2002, 38(4): 393-422 Y, et al. Computer.
  • 2Poornima A S, Amberker B B, Likith H S R, et al. Secure Data Collection in Sensor Networks Using Tree-based Key Management Scheme and Secret Sharing[C]//Proc. of 2010 International Conference on Computer Information Systems and Industrial Management Applications. Krackow, Poland: [s. n.], 2010.
  • 3Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2004, 47(6): 53-57.
  • 4Carman D W, Kruus P S, Matt B J. Constraints and Approaches for Distributed Sensor Network Security[R]. The Security Research Division Network Associates, Inc., Tech. Rep.: 010, 2000.
  • 5Sierra J M, Castro J C H, Jayaram N, et al. Low Computational Cost Integrity for Block Ciphers[J]. Future Generation Computer Systems, 2004, 20(5): 857-863.
  • 6Chan Haowen, Perrig A, Song Dawn. Random Key Predistribution Schemes for Sensor Networks[C]//Proc. of 2003 IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Computer Society, 2003.
  • 7Du Wenliang, Deng Jing, Han Yunghsiang, et al. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks[C]//Proc. of the 10th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2003.
  • 8Delgado-Mohatar O, Fuster-Sabater A, Sierra J M. A Light-weight Authentication Scheme for Wireless Sensor Networks[J]. Ad Hoc Networks, 2011, 9(5): 727-735.
  • 9Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. Boca Raton, USA: CRC Press, Inc., 1996.
  • 10任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709

共引文献3

同被引文献6

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部