期刊文献+

一种改进的动态用户认证协议 被引量:3

An Improved Dynamic User Authentication Protocol
下载PDF
导出
摘要 针对用户快速认证问题,对动态用户认证协议作了介绍,并指出了其可能的安全隐患。提出了对动态用户认证协议的改进方案,并对改进协议的性能进行讨论,并论述了该协议在异构环境下无线传感器网络中的应用。 In view of fast user authentication,the dynamic user authentication protocol is introduced and the possible security risks are pointed out.Then an improvement of the dynamic user authentication protocol is proposed.Finally,the performance of the improved protocol and its application in wireless sensor networks in heterogeneous environment are discussed.
作者 张明
出处 《电子科技》 2011年第6期137-139,共3页 Electronic Science and Technology
关键词 无线传感器网络 快速认证 动态用户认证 wireless sensor network fast authentication dynamic user authentication
  • 相关文献

参考文献10

  • 1周贤伟,施德军,覃伯平.无线传感器网络认证机制的研究[J].计算机应用研究,2006,23(12):108-111. 被引量:6
  • 2WATRO R,KONG D.TinyPK:securing sensor networks with public key technology[C].Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks,ACM Press,2004:59-64.
  • 3ZINAIDA B,NILS G,OSSI R.Realizing robust user authentication in sensor networks[J].Workshop on Real -World Wireless Sensor Networks (REALWSN),2005,26(9):135-142.
  • 4赵玉华,李志刚,李志民,张荣雨.无线传感器网络用户认证技术综述[J].计算机测量与控制,2009,17(12):2348-2351. 被引量:3
  • 5WONG K H,ZHENG Y,CAO J M.A Dynamic user authentication scheme for wireless sensor networks[C].In Proc.of the IEEE International Conference on Sensor Networks,Ubiquitous,and Trustworthy Computing (SUTC'06),2006:244-251.
  • 6LEEC Y,LIN C H,ChangC C.An improved low communication cost user authentication[C].Taiwan:Scheme for Mobile Communication,Proceedings of the IEEE 19th International Conference on Advanced Information Networking and Applications(AINA 2005),2005:249-252.
  • 7TSENG H R,JAN R H,YANG W.An improved dynamic user authentication scheme for wireless sensor networks[C].In Proc.of the IEEE Global Communications Conference(GLOBECOM'07),2007:986 -990.
  • 8BINOD V,JORGE S S,JOEL J P,et al.Robust dynamic user authentication scheme for wireless sensor networks[C].ACM Q2SWinet'09,2009:28-29.
  • 9LEE C K.A novel dynamic user authentication scheme for wireless sensor networks[C].Wireless Communication Systems,ISWCS'08,2008:608-612.
  • 10CAO Zhen,ZHOU Xia,XU Maoxing.Enhancing base station security against dos attacks in wireless sensor networks[C].Wireless Communications,Networking and Mobile Computing 2006 International Conference,2006:1-4.

二级参考文献23

  • 1Pathan A S K, Lee H W, Hong C S. Security in wireless sensor networks issues and challenges [A]. Advanced Communication Technology, ICACT 2006. The 8th International Conference [C]. 2006, 1043- 1048.
  • 2Saraogi M Security in wireless sensor networks [DB/OL].http: //www. cs. utk. edu/saraogi/594paper. pdf.
  • 3Watro R, Kong D, fen Cuti S, et. al. TinyPK: Securing Sensor Net works with Public Key Technology [A]. Proceedings of the 2nd ACM workshop on Security of Ad Hoc and sensor networks [C]. ACM Press, 2004: 59-64.
  • 4Benenson Z, Gedicke N , Raivio O. Realizing robust user authentication in sensor networks [A]. Workshop on Real-World Wireless Sensor Networks [C]. Sweden , 2005.
  • 5Banerjee S , Mukhopadhyay D. Symmetric key based authentication querying in wireless sensor networks [A] . Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks [C] . Nice , France , 2006.
  • 6Wong K H M, Zheng Y, Cao J, et al. A dynamic user authentication scheme for wireless sensor networks [A] . In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 06) [C]. 2006, 244-251.
  • 7Bauer K, Lee H. A distributed authentication scheme for a wireless sensing system[A]. Proceedings of the 2nd International Workshop on Networked Sensing Systems (INSS05)[C] .
  • 8Tseng H R, Jan R H, Yang W. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks [A] . IEEE Global Telecommunications Conference [C]. (GLOBECOM '07), 2007, 986-990.
  • 9Jiang C, Li B, Xu H. An Efficient Scheme for User Authentication in Wireless Sensor Networks [A]. 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW' 07) [C]. 2007, 438-442.
  • 10A J Menezes,P C V Oorschot,S A Und Vanstone.Handbook of Applied Cryptography[M].Boca Raton,FL:CRC Press,1997.92-93.

共引文献7

同被引文献36

  • 1张晓军,吕洁,张蓓.HTTP重定向在网关认证中的应用[J].大连理工大学学报,2005,45(z1):48-51. 被引量:7
  • 2HE Jun-hua, CAO Yuan. Research and analysis the PPPoE server technology based on the Routeros [J]. Computer Ap- plication and System Modeling, 2010,15 : 209-211.
  • 3CHENG Jun, WU Hong-hua. The application of the PP-POE for network security management using routerOS[J].2010 International Conference on Computer Design and Ap- plications, 2010, 5: 569-571.
  • 4IEEE. IEEE 802. 1X-port based network access control [S]. [s. 1. ]: IEEE, 2006.
  • 5WELLINGLuke,THOMSONLaura.PHP和MySQLWeb开发[M].4版.北京:机械工业出版社,2009.
  • 6谭金府,宋安军,彭勤科,胡保生.一个Web环境下单点登录系统的研究与实现[J].现代电子技术,2007,30(18):102-104. 被引量:4
  • 7Benenson Z, Gartner F, Kesdogan D. User Authentication in Sensor Networks[C]//Proc. of Workshop on Sensor Network. Ulm, Germany: [s. n.], 2004.
  • 8Benenson Z, Gedicke N, Raivio O. Realizing Robust User Authentication in Sensor Networks[C]//Proc. of REALWSN'05. Stockholm, Sweden: [s. n.], 2005:20-21.
  • 9Wong K H M, Zheng Y, Cao J, et al. A Dynamic User Authentication Scheme for Wireless Sensor Networks[C]//Proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Taichung, China: [s. n.], 2006: 5-7.
  • 10Das M L. Two-factor User Authentication in Wireless Sensor Networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3): 1086-1090.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部