期刊文献+

基于多级分簇无线传感器网络的身份认证机制 被引量:1

Authentication mechanism based on multi-level clustering wireless sensor network
下载PDF
导出
摘要 针对多级分簇无线传感器网络拓扑结构的特点,提出一种新的身份认证机制,以解决传统认证方式中点到点直接认证所需耗费的巨大计算量或存储量问题。该机制以基站作为可信第三方,并通过对称加密算法间接实现各相关节点之间的身份认证。该机制既能避免采用非对称密码算法所带来的大量能量消耗,又能解决基于对称密码的传统预分配密钥机制导致的网络扩展性差的问题,能为多级分簇无线传感器网络提供有效的身份认证。 A novel authentication mechanism, which is implemented based on the feature of the multi-level clustering wireless sensor network topology, is proposed to solve the problem about the huge energy consumption or memory usage in traditional au- thentication mechanism. With the credible base station as the trusted third party, this mechanism can realize indirect authentica- tion for related nodes by utilizing the symmetric encryption algorithm as the basic encryption algorithm. This authentication mechanism can not only avoid the huge energy consumption brought by asymmetric encryption algorithm, but also solve the sca- lability problem of traditional pre-allocated-key mechanism based on symmetric encryption, and is able to provide effective au- thentication service for multi-level clusterin~ wireless sensor networks.
作者 张旸 何泾沙
出处 《计算机工程与设计》 CSCD 北大核心 2013年第1期37-41,共5页 Computer Engineering and Design
基金 北京市教育委员会科技发展计划面上基金项目(KM201010005027)
关键词 身份认证 无线传感器网络 多级分簇网络 对称加密 间接认证 authenticatiom wireless sensor network multi-level clustering network symmetric encryption indirect authentication
  • 相关文献

参考文献7

二级参考文献125

共引文献125

同被引文献15

  • 1Li C T,Lee C C.A novel user authentication and privacy preserving scheme with smartcards for wireless communications[J].Mathematical and Computer Modelling,2012,55(1-2):35-44.
  • 2ZENG Peng,CAO Zhenfu,Choo K K R,et al.On the anonymity of some authentication schemes for wireless communications[J].IEEE Communications Letters,2009,13(3):170-171.
  • 3Lee C C,Hwang M S,Liao I E.A new authentication protocol based on pointer forwarding for mobile communications[J].Wireless Communications and Mobile Computing,2008,8(5):661-672.
  • 4Lee J S,Chang J H,Lee D H.Security flaw of authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters,2009,13(5):292-293.
  • 5Lee Y H,Kim S J,Won D H.Enhancement of two-factor authenticated key exchange protocols in public wireless LANs[J].Computers&Electrical Engineering,2010,36(1):213-223.
  • 6DONG Ping,ZHANG Hongke,LUO Hongbin,et al.A network-based mobility management scheme for future Internet[J].Computers&Electrical Engineering,2010,36(2):291-302.
  • 7SU Renwang,CAO Zhenfu.An efficient anonymous authentication mechanism for delay tolerant networks[J].Computers&Electrical Engineering,2010,36(3):435-441.
  • 8ZHU Jianming,MA Jianfeng.A new authentication scheme with anonymity for wireless environments[J].IEEE Transactions on Consumer Electronics,2004,50(1):231-235.
  • 9Lee C C,Hwang M S,Liao I E.Security enhancement on a new authentication scheme with anonymity for wireless environments[J].IEEE Transactions on Industrial Electronics,2006,53(5):1683-1686.
  • 10Wu C C,Lee W B,Tsaur W J.A secure authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters,2008,12(10):722-723.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部