计算机科学 ›› 2016, Vol. 43 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2016.10.031

• 信息安全 • 上一篇    下一篇

基于簇的水声传感器网络的安全认证协议

任超群,徐明   

  1. 上海海事大学信息工程学院 上海201306,上海海事大学信息工程学院 上海201306;同济大学电子与信息工程学院 上海201804
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61202370),上海市教委科研创新项目(14YZ110),中国博士后科学基金资助

Security Authentication Protocol Based on Cluster for Underwater Acoustic Sensor Networks

REN Chao-qun and XU Ming   

  • Online:2018-12-01 Published:2018-12-01

摘要: 近年来,基于簇的水声传感器网络得到广泛应用。由于水声传感器多用于军事行业,使得提高水声传感器网络的安全性变得十分重要。针对提高水声传感器网络安全性这一问题,提出了结合ECC Diffie-Hellman密钥交换、一元高阶多项式、双线性映射和哈希函数的安全认证协议。经过分析,该协议满足了认证、访问控制、数据保密性、数据完整性和不可否认性等安全需求。结合BAN逻辑进行形式化分析,证明该协议是安全的;同时,将协议的两个阶段分别与同类型认证协议进行对比,实验结果表明,所提协议的性能在时间或者空间上有所提升。

关键词: 水声传感器,认证协议,双线性映射,BAN逻辑

Abstract: In recent years,the application of underwater acoustic sensor networks based on cluster is widely used.The underwater acoustic sensor is mainly used in military industry,which emphasizes the importance of safety.In order to improve the safety of underwater acoustic sensor networks,this paper presented a secure authentication protocol,which combines the ECC Diffie-Hellman key exchange,single variable higher order polynomial bilinear mapping and hash function.After analyzing,this protocol satisfies safety requirements in authentication,access control,data confidentiality,data integrity and non-repudiation.This protocol is proved to be secure when combined with BAN logic formal analysis.In addition,the two stages of this protocol are compared with the same type certification protocol separately.The comparison results show that the performance of this protocol is improved in time and space.

Key words: Underwater acoustic sensor,Authentication protocol,Bilinear mapping,BAN logic

[1] Li L C,Liu R S.Securing Cluster-Based Ad Hoc Networks with Distributed Authorities[J].IEEE Transactionson on Wireless Communications,2010,9(10):3072-3081
[2] Guo M H,Liaw H T,Deng D J,et al.Cluster-based securecommunication mechanism in wireless ad hoc networks[J].Net Information Security,2010,4(4):352-360
[3] Islam M R,Azad S,Morshed M M.A Secure Communication Suite for Cluster-based Underwater Surveillance Networks[C]∥2014 International Conference on IEEE Electrical Engineering and Information & Communication Technology (ICEEICT).2014:1-5
[4] Lu H,Li J,Guizani M.Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks[J].IEEE Transactions on Parallel & Distributed Systems ,2014,25(3):750-761
[5] Zhang Rui,Shi Jing,Zhang Yan-chao,et al.Secure Top-k Query Processing in Unattended[J].IEEE Transactions on Vehicular Technology,2014,3(9):4681-4693
[6] Vaidya B,Pyun J Y,Pan S,et al.Secure framework for intergrated multipath MANTE with internet[C]∥Internation Symposium on Application and the Internet.2008:83-88
[7] Bellare M,Namprempre C,Neven G.Security Proofs for Identity Based Identification and Signature Schemes[J].Journal of Cryptology,2009,22(1):1-61
[8] Yasmin R,Ritter E,Wang G.An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:882-889
[9] Kiliani H.An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update[C]∥IEEE International Conference on Advanced Information Networking & Applications.IEEE,2014:351-358
[10] Krishna R.Cookie-based acceleration of an authentication protocol:US,US8887233[P].2014
[11] Guo C,Zhang Z J,Zhu L H,et al.A novel secure group RFID authentication protocol[J].Journal of China Universities of Posts & Telecommunications,2014,21(1):94-103
[12] Yang Shi-ping.Security protocol and BAN Logic [D].Guiyang:Guizhou University,2007(in Chinese ) 杨世平.安全协议及其BAN逻辑分析研究[D].贵阳:贵州大学,2007
[13] Yang Tao.Based proxy signature vehicle from research networking privacy [D]:Beijing:Beijing University,2013(in Chinese)杨涛.基于代理签名的车辆自组网的隐私保护研究[D].北京:北京大学,2013
[14] He Dao-jing.Key Technology of wireless network security [D].Hangzhou:Zhejiang University,2012(in Chinese) 何道敬.无线网络安全的关键技术研究[D].杭州:浙江大学,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!