期刊文献+

可证明安全的面向无线传感器网络的三因素认证及密钥协商方案 被引量:5

Provably secure three-factor authentication and key agreement scheme for wireless sensor network
下载PDF
导出
摘要 对Amin等提出的无线传感器网络环境下匿名认证协议进行了安全分析,指出此协议不能抵抗移动设备丢失攻击、用户冒充攻击及传感器节点捕获攻击。基于口令和智能卡这2个认证因素,增加生物特征标识作为附加安全因素,设计了一个三因素无线传感器认证密钥协商方案。利用BAN逻辑和启发式分析证明了方案的安全性,通过与其他相关协议比较,改进协议计算量相对比较低,且实现了所有安全属性,适应实际的应用。 Analyse an anonymous patient monitoring system using wireless medical sensor networks proposed by Amin et al.,s scheme,we find that the scheme cannot resist mobile device loss attack,user impersonation attack and node capture attack.Taking as the smart card and password are basic secure factors and biometric information is an additional secure factor.We propose a three-factor authentication and key agreement scheme for wireless sensor networks.The proposed scheme is proved to be secure via Burrows-Abadi-Needham(BAN)logic and the heuristic analysis.Finally,we compared our scheme with other related schemes,and the results showed that our proposed scheme not only achieves all security property,but also has lower the computing of the proposed scheme is relatively low.So,it is suitable for practical application.
作者 屈娟 冯玉明 李艳平 李丽 QU Juan;FENG Yuming;LI Yanping;LI Li(School of Mathematics and Statistics, Chongqing Three Gorges University, Chongqing 404100, China;Key Laboratory of Intelligent Information Processing and Control of Chongqing Municipal Institutions of Higher Education,Chongqing Three Gorges University, Chongqing 404100, China;College of Mathematics and Information Science, ShaanXi Normal University, Xi’an 710062, China)
出处 《通信学报》 EI CSCD 北大核心 2018年第A02期189-197,共9页 Journal on Communications
基金 国家自然科学基金资助项目(No.61402275) 重庆市教委科学技术研究资助项目(No.KJ1501019)~~
关键词 无线传感器网络 生物特征 密钥协商 智能卡 wireless sensor networks biometrics key agreement smart card
  • 相关文献

参考文献5

二级参考文献29

  • 1王潮 朱美丽 时向勇.基于ECC的CBTC无线接入安全认证架构研究.哈尔滨工业大学学报(增刊),2009,41:193-197.
  • 2GERLA M. Ad Hoc Networks: Technologies and Protocols[M]. Springer Science Press,2004.
  • 3王潮,张振华,应仲平.WSN中基于身份的分散密钥管理研究[A].第六届中国测试学术会议论文集[c].2010.
  • 4IBRIQ J, MAHGOUB I. A hierarchical key establishment scheme for wireless sensor networks[C]. AINA'07[C]. Niagara Falls, Canada, 2007.210-219.
  • 5FANTACCI R, CHITI F, MACCARI L. Fast distributed bi-directional authentication for wireless sensor networks [J]. Security and Communication Networks, 2008, 1(l): 17-24.
  • 6HAN K, SHON T, KIM K. Efficient mobile sensor authentication in smart home and WPAN [J]. IEEE Transactions on Consumer Electronics, 2010, 56(2): 591-596.
  • 7HAN K, KIM K, SHON T. Untraceable mobile node authentication in WSN[J]. Sensors, 2010, 10(5): 4410-4429.
  • 8OKEYA K, SAKURAI K. A scalar multiplication algorithm with recovery of y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystem[J]. IEICE Trans Fundamental, 2002, 85(1): 84-93.
  • 9FUTA Y, OHMORI M. Efficient scalar multiplication on Montgomery-form elliptic curves[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004,87(8): 2126-2136.
  • 10LIU D, DAI Y Q. The algorithm of computing kP+mQ+IR on a Montgomery-form elliptic curve[A]. Chinese National Conference of Computer 2003[C]. Beijing: Tsinghua University Press,2003. 198-203.

共引文献92

同被引文献19

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部