Computer Science ›› 2016, Vol. 43 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2016.10.031

Previous Articles     Next Articles

Security Authentication Protocol Based on Cluster for Underwater Acoustic Sensor Networks

REN Chao-qun and XU Ming   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In recent years,the application of underwater acoustic sensor networks based on cluster is widely used.The underwater acoustic sensor is mainly used in military industry,which emphasizes the importance of safety.In order to improve the safety of underwater acoustic sensor networks,this paper presented a secure authentication protocol,which combines the ECC Diffie-Hellman key exchange,single variable higher order polynomial bilinear mapping and hash function.After analyzing,this protocol satisfies safety requirements in authentication,access control,data confidentiality,data integrity and non-repudiation.This protocol is proved to be secure when combined with BAN logic formal analysis.In addition,the two stages of this protocol are compared with the same type certification protocol separately.The comparison results show that the performance of this protocol is improved in time and space.

Key words: Underwater acoustic sensor,Authentication protocol,Bilinear mapping,BAN logic

[1] Li L C,Liu R S.Securing Cluster-Based Ad Hoc Networks with Distributed Authorities[J].IEEE Transactionson on Wireless Communications,2010,9(10):3072-3081
[2] Guo M H,Liaw H T,Deng D J,et al.Cluster-based securecommunication mechanism in wireless ad hoc networks[J].Net Information Security,2010,4(4):352-360
[3] Islam M R,Azad S,Morshed M M.A Secure Communication Suite for Cluster-based Underwater Surveillance Networks[C]∥2014 International Conference on IEEE Electrical Engineering and Information & Communication Technology (ICEEICT).2014:1-5
[4] Lu H,Li J,Guizani M.Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks[J].IEEE Transactions on Parallel & Distributed Systems ,2014,25(3):750-761
[5] Zhang Rui,Shi Jing,Zhang Yan-chao,et al.Secure Top-k Query Processing in Unattended[J].IEEE Transactions on Vehicular Technology,2014,3(9):4681-4693
[6] Vaidya B,Pyun J Y,Pan S,et al.Secure framework for intergrated multipath MANTE with internet[C]∥Internation Symposium on Application and the Internet.2008:83-88
[7] Bellare M,Namprempre C,Neven G.Security Proofs for Identity Based Identification and Signature Schemes[J].Journal of Cryptology,2009,22(1):1-61
[8] Yasmin R,Ritter E,Wang G.An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:882-889
[9] Kiliani H.An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update[C]∥IEEE International Conference on Advanced Information Networking & Applications.IEEE,2014:351-358
[10] Krishna R.Cookie-based acceleration of an authentication protocol:US,US8887233[P].2014
[11] Guo C,Zhang Z J,Zhu L H,et al.A novel secure group RFID authentication protocol[J].Journal of China Universities of Posts & Telecommunications,2014,21(1):94-103
[12] Yang Shi-ping.Security protocol and BAN Logic [D].Guiyang:Guizhou University,2007(in Chinese ) 杨世平.安全协议及其BAN逻辑分析研究[D].贵阳:贵州大学,2007
[13] Yang Tao.Based proxy signature vehicle from research networking privacy [D]:Beijing:Beijing University,2013(in Chinese)杨涛.基于代理签名的车辆自组网的隐私保护研究[D].北京:北京大学,2013
[14] He Dao-jing.Key Technology of wireless network security [D].Hangzhou:Zhejiang University,2012(in Chinese) 何道敬.无线网络安全的关键技术研究[D].杭州:浙江大学,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!