期刊文献+

WSN中基于ECC的轻量级认证密钥协商协议 被引量:9

Lightweight authenticated key agreement protocol based on ECC for wireless sensor networks
下载PDF
导出
摘要 为解决无线传感器网络密钥管理与认证协议设计中由于节点频繁移动所带来的计算量、存储量等资源消耗过大问题,提出了一种基于ECC的轻量级认证密钥协商协议。该协议主要用于网络中任意用户节点之间,以及用户节点与网络之间的双向认证和会话密钥的协商。方案采用ECC进行会话密钥协商,结合AES对称密钥加密技术保证信息传输过程的保密性。与传统的密钥协商协议相比,能够在更小的密钥量下提供更大的安全性,并减少了对节点计算量和存储量的需求。该协议在ID-BJM安全模型下证明了其安全性。分析结果表明,该协议满足前后向安全性和PKG前向安全性。 In order to solve excessive consumption of computation and storage due to sensor nodes move in WSN fre: quently, a new lightweight authenticated key management protocol based on ECC is proposed. The mutual authentication and agreement on a session key could be realized between users, or between user and network server in WSN. This protocol adopts ECC techniques to consult session key and AES symmetrical encryption technology to achieve confidentiality. Compared with traditional protocol, this protocol could provide greater security with fewer bits and reduce the require- ment in computation and storage. The protocol is proved to be a secure authenticated key agreement in ID-BIM model. Results show that it provides perfect forward/back secrecy and PKG forward secrecy.
出处 《计算机工程与应用》 CSCD 2014年第2期65-69,80,共6页 Computer Engineering and Applications
基金 中央办公厅信息安全重点实验室基金课题(No.YZDJ1004 No.YZDJ1101)
关键词 无线传感器网络 ID BJM ECDH 密钥协商 安全性 wireless sensor networks ID-BIM ECDH key agreement security
  • 相关文献

参考文献7

二级参考文献82

共引文献51

同被引文献64

  • 1刘连浩,申勇.椭圆曲线密码体制中标量乘法的快速算法[J].计算机应用研究,2009,26(3):1104-1108. 被引量:12
  • 2许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 3席国宝,陈惠芳,赵问道.基于中国剩余定理的秘密共享组播密钥管理方案[J].电子与信息学报,2006,28(12):2378-2381. 被引量:5
  • 4国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.
  • 5裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94
  • 6ChristofPaar,JanPelzl.深入浅出密码学-常用加密技术原理与应用[M].马小婷,译.北京:清华大学出版社,2012.
  • 7Gao Ang,Wei Wei,Wang Zhixiao,et al.A hierarchical authentication scheme for the different radio ranges sensor networks[C]//International Conference on Computational Science and Engineering.Vancouver,BC,Canada,2009.NJ,United States:IEEE Computer Society,2009:494-501.
  • 8Bhuse V,Gupta A,Pidva R.A distributed approach to security in sensornets[C]//IEEE 58th Vehicular Technology Conference,Orlando,FL,United states,2003.NY,United States:Institute of Electrical and Electronics Engineers Inc.,2004:3010-3014.
  • 9Bellazreg R,Boudriga N,Hamdi M.A dynamic distributed key tunneling protocol for heterogeneous wireless sensor networks[C]//IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications,Liverpool,United Kingdom,2012.Washington,United States:IEEE Computer Society,2012:1077-1082.
  • 10He Daojie,Bu Jiajun,Zhu Sencun.Distributed access control with privacy support in wireless sensor networks[J].IEEE Transactions on Wireless Communications,2011,10(10):3472-3481.

引证文献9

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部