期刊文献+

基于双线性对的WSN密钥协商和认证协议 被引量:4

WSN Key Negotiation and Authentication Protocol Based on Bilinear Pairings
下载PDF
导出
摘要 无线传感器网络(WSN)节点在电源、计算能力和内存容量等方面存在局限性,且面临的安全威胁更复杂。为此,提出一种适用于类LEACH路由的WSN密钥协商和认证协议。通过引入当前轮数,实现节点间的双向身份认证,以抵御选择性转发、Sybil和Hello泛洪等常见攻击。利用ID和双线性对原理生成节点间的动态会话密钥,从而减少节点间的交互步骤,降低能耗。SVO逻辑推理和性能分析结果表明,该协议同时满足安全性要求和WSN的特殊应用要求。 Due to the limitations of power, computation capability and storage resources, as well as the more complex security threats the current network faces, a pairings-based key negotiation and authentication protocol for class LEACH routing in Wireless Sensor Network(WSN) is proposed, which achieves bidirectional authentication between nodes by introducing the current round of routing to defend familiar attacks such as selective forwarding, Sybil attack, and Hello flood attack in WSN. And dynamic session keys between nodes are generated by using ID and bilinear principle, which reduces the interaction steps between nodes and energy costs. SV0 logic reasoning and performance analysis show that the protocol can guarantee the security of WSN, and it meet the special application requirements of WSN.
出处 《计算机工程》 CAS CSCD 2012年第9期121-124,共4页 Computer Engineering
关键词 无线传感器网络 密钥协商 SVO逻辑 双线性对 身份认证 形式化分析 Wireless Sensor Network(WSN) key negotiation SVO logic bilinear pairings identity authentication formal analysis
  • 相关文献

参考文献11

二级参考文献60

  • 1LeiHu,Jun-WuDong,Ding-YiPei.Implementation of Cryptosystems Based on Tate Pairing[J].Journal of Computer Science & Technology,2005,20(2):264-269. 被引量:8
  • 2莫燕,张玉清,李学干.关于安全协议设计原则的研究[J].计算机工程,2005,31(24):183-185. 被引量:3
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4Syverson P F, Vanoorscho P C. On Unifying Some Cryptographic Protocol Logics[C]//Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy. Los Alamitos, USA: IEEE Computer Society Press, 1994: 14-28.
  • 5Syverson P F. Vanoorscho P C. A Unified Cryptographic Protocol Logics[R]. Washington D. C., USA: Naval Research Laboratory, Technical Report: 5540-227, 1996.
  • 6Burrows M, Abadi M, Needham R. A Logic of Authentication[J]. ACM Transactions on Computer Systems, 1990, 8(1): 18-36.
  • 7ESCHENAUER L, GLIGOR V. A key management scheme for distributed sensor networks[ C]//Proc of the 9th ACbi Conference on Computer and Communications Security. New York:ACM Press,2002:41- 47.
  • 8CHAN H, PERING A, SONG D. Random key predistribution schemes for sensor networks[C]//Proc of IEEE Syrup on Security and Privacy. Washington DC : IEEE Computer Society,2003 : 197- 213.
  • 9BLOM R. An optimal class of symmetric key generation systems[ C ]// BETH T, COT N, INGEMARSSON I. Proc of EUROCRYPT' 84. New York : Springer-Verlag, 1984:335- 338.
  • 10BLUNDO C,SANTIS A D,HERZBERG A,et al. Perfectly secure key distribution for dynamic conferences[ J]. Information and Computation,1998,146(1 ) :1-23.

共引文献145

同被引文献32

引证文献4

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部