Computer Science ›› 2015, Vol. 42 ›› Issue (2): 100-102.doi: 10.11896/j.issn.1002-137X.2015.02.021

Previous Articles     Next Articles

Design and Proof of Bilateral Authentication Protocol for Wireless Sensor Network

GUO Ping, FU De-sheng, CHENG Ya-ping and ZHAN Xiang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A bilateral authentication protocol between users and sensor nodes was proposed for WSN(wireless sensor network).Analysis shows that authentication protocol not only avoids the drawback of private key escrow in the identity-based system,but also achieves the advantage of simplifying complication of producing and verifying public key in traditional certificate-based system.Moreover,the authentication protocol doesn’t need TTP(Trusted Third Party),is efficient and has less communications.Finally,the integrity,correction and security of protocol were proved with BAN logic formal method.

Key words: Wireless sensor network (WSN),Bilateral authentication,BAN logic

[1] Gura N,Patel A,Wander A,et al.Comparing Elliptic CurveCryptography and RSA on 8bit CPUs[J].CHES,2004(8):11-13
[2] Hill J,Szewczyk R,Woo R,et al.System Architecture Directions for Networked Sensors[C]∥Proceeding of Architectural Support for Programming Languages and Operating Systems.Quintana Roo,USA:IEEE Publisher,2000:93-104
[3] Malan D J,Welsh M,Smith M D.Implementing Public-Key Infrastructure for Sensor Networks [J].ACM Transactions on Sensor Networks,2008,4(4):1-23
[4] Levis P,Madden S,Polastre J,et al.TinyOS:An operating system for sensor networks [EB/OL].2004-6-18[2014-7-9].http://www.cs.berkeley.edu/~culler/AIIT/papers/TinyOS/levis06tinyos.pdf
[5] Watro R,Kong D,Sue F C,et al.TinyPK:Securing Sensor Networks with Public Key Technology[C]∥Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.Miami,USA:IEEE Publisher,2004:59-64
[6] Benenson Z,Gedicke N,Raivio O.Realizing Robust User Au-thentication in Sensor Networks[C]∥Proceedings of Workshop on Real-World Wireless Sensor Networks.LNSC4582, Palma de Mallorca,Spain:Springer-Verlag,2005:556-566
[7] Zhou Y,Zhang Y,Fang Y.Access Control in Wireless Sensor Networks [J].Ad hoc Networks,2007(5):3-13
[8] Oliveira L B,Dahab R,Lopez J.Identity-Based Encryption forSensor Networks[C]∥Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.San Francisco,USA:IEEE Publisher,2012:290-294
[9] Cheng Hai-bin,Yang Guan.An Authenticated Identity-basedKey Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2012,13(2):31-38
[10] Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]∥Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology.London,Britain:Springer-Verlag,2001:213-229
[11] 杨庚,程宏兵.一种有效的无线传感器网络密钥协商方案[J].电子学报,2008,36(7):1389-1395
[12] Zhang Yi-he,Liu Wei,Lou Wu Jun,et al.Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks[J].IEEE Journal on Selected Areas in Communications,2013,24(2):247-260
[13] Kampanakis P T.Identity-based Cryptography Feasibility &Applications in Next Generation Sensor Networks[EB/OL].2011-11-6 [2014-7-9].http://www.lib.ncsu.edu/theses/available/etd-08042007-125351/unrestricted/etd.pdf
[14] Dong Xiao-lei,Wei Li-fei,Zhu Hao-jin,et al.EP2DF:an efficient privacy-preserving date-forwarding scheme for service-oriented vehicular Ad hoc networks[J].IEEE Transactions on Vehicular Technology,2011,60(2):580-591
[15] 郭萍,傅德胜,朱节中,等.无线MESH轻量级容侵方案[J].计算机科学,2013,40(12):200-206
[16] Brown D R.SEC 2:Recommended Elliptic Curve Domain Parameters[EB/OL].2011-11-8[2014-7-10].http://www.secg.org/download/aid-784/sec2-v2.pdf
[17] Burrows M,Abadi M,Needham R.Logic of Authentication [J].ACM Transactions on Computer Systems,1990(8):18-36

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!