计算机科学 ›› 2015, Vol. 42 ›› Issue (2): 100-102.doi: 10.11896/j.issn.1002-137X.2015.02.021

• 信息安全 • 上一篇    下一篇

一种无线传感器网络双向认证协议设计及证明

郭萍,傅德胜,成亚萍,展翔   

  1. 南京信息工程大学计算机与软件学院 南京210044,南京信息工程大学计算机与软件学院 南京210044,南京信息工程大学计算机与软件学院 南京210044,南京信息工程大学计算机与软件学院 南京210044
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受中国气象局项目(2014MC16),江苏大学生创新基金(201410300049)资助

Design and Proof of Bilateral Authentication Protocol for Wireless Sensor Network

GUO Ping, FU De-sheng, CHENG Ya-ping and ZHAN Xiang   

  • Online:2018-11-14 Published:2018-11-14

摘要: 构建了一种适用于无线传感器网络的用户与传感器节点间的双向认证协议。分析表明,协议所用算法克服了基于身份公钥的机制中第三方私钥托管问题,并简化了传统基于证书的机制产生及验证证书的复杂性。系统初始化完成后,用户与传感器节点间的双向认证无需可信第三方参与,认证协议简单高效、通信量少。采用BAN(Burrows-Abadi-Needham)逻辑证明协议的完备性、正确性及安全性。

关键词: 无线传感器网络(WSN),双向认证,BAN逻辑

Abstract: A bilateral authentication protocol between users and sensor nodes was proposed for WSN(wireless sensor network).Analysis shows that authentication protocol not only avoids the drawback of private key escrow in the identity-based system,but also achieves the advantage of simplifying complication of producing and verifying public key in traditional certificate-based system.Moreover,the authentication protocol doesn’t need TTP(Trusted Third Party),is efficient and has less communications.Finally,the integrity,correction and security of protocol were proved with BAN logic formal method.

Key words: Wireless sensor network (WSN),Bilateral authentication,BAN logic

[1] Gura N,Patel A,Wander A,et al.Comparing Elliptic CurveCryptography and RSA on 8bit CPUs[J].CHES,2004(8):11-13
[2] Hill J,Szewczyk R,Woo R,et al.System Architecture Directions for Networked Sensors[C]∥Proceeding of Architectural Support for Programming Languages and Operating Systems.Quintana Roo,USA:IEEE Publisher,2000:93-104
[3] Malan D J,Welsh M,Smith M D.Implementing Public-Key Infrastructure for Sensor Networks [J].ACM Transactions on Sensor Networks,2008,4(4):1-23
[4] Levis P,Madden S,Polastre J,et al.TinyOS:An operating system for sensor networks [EB/OL].2004-6-18[2014-7-9].http://www.cs.berkeley.edu/~culler/AIIT/papers/TinyOS/levis06tinyos.pdf
[5] Watro R,Kong D,Sue F C,et al.TinyPK:Securing Sensor Networks with Public Key Technology[C]∥Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.Miami,USA:IEEE Publisher,2004:59-64
[6] Benenson Z,Gedicke N,Raivio O.Realizing Robust User Au-thentication in Sensor Networks[C]∥Proceedings of Workshop on Real-World Wireless Sensor Networks.LNSC4582, Palma de Mallorca,Spain:Springer-Verlag,2005:556-566
[7] Zhou Y,Zhang Y,Fang Y.Access Control in Wireless Sensor Networks [J].Ad hoc Networks,2007(5):3-13
[8] Oliveira L B,Dahab R,Lopez J.Identity-Based Encryption forSensor Networks[C]∥Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.San Francisco,USA:IEEE Publisher,2012:290-294
[9] Cheng Hai-bin,Yang Guan.An Authenticated Identity-basedKey Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2012,13(2):31-38
[10] Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]∥Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology.London,Britain:Springer-Verlag,2001:213-229
[11] 杨庚,程宏兵.一种有效的无线传感器网络密钥协商方案[J].电子学报,2008,36(7):1389-1395
[12] Zhang Yi-he,Liu Wei,Lou Wu Jun,et al.Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks[J].IEEE Journal on Selected Areas in Communications,2013,24(2):247-260
[13] Kampanakis P T.Identity-based Cryptography Feasibility &Applications in Next Generation Sensor Networks[EB/OL].2011-11-6 [2014-7-9].http://www.lib.ncsu.edu/theses/available/etd-08042007-125351/unrestricted/etd.pdf
[14] Dong Xiao-lei,Wei Li-fei,Zhu Hao-jin,et al.EP2DF:an efficient privacy-preserving date-forwarding scheme for service-oriented vehicular Ad hoc networks[J].IEEE Transactions on Vehicular Technology,2011,60(2):580-591
[15] 郭萍,傅德胜,朱节中,等.无线MESH轻量级容侵方案[J].计算机科学,2013,40(12):200-206
[16] Brown D R.SEC 2:Recommended Elliptic Curve Domain Parameters[EB/OL].2011-11-8[2014-7-10].http://www.secg.org/download/aid-784/sec2-v2.pdf
[17] Burrows M,Abadi M,Needham R.Logic of Authentication [J].ACM Transactions on Computer Systems,1990(8):18-36

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!