计算机科学 ›› 2016, Vol. 43 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2016.10.031
任超群,徐明
REN Chao-qun and XU Ming
摘要: 近年来,基于簇的水声传感器网络得到广泛应用。由于水声传感器多用于军事行业,使得提高水声传感器网络的安全性变得十分重要。针对提高水声传感器网络安全性这一问题,提出了结合ECC Diffie-Hellman密钥交换、一元高阶多项式、双线性映射和哈希函数的安全认证协议。经过分析,该协议满足了认证、访问控制、数据保密性、数据完整性和不可否认性等安全需求。结合BAN逻辑进行形式化分析,证明该协议是安全的;同时,将协议的两个阶段分别与同类型认证协议进行对比,实验结果表明,所提协议的性能在时间或者空间上有所提升。
[1] Li L C,Liu R S.Securing Cluster-Based Ad Hoc Networks with Distributed Authorities[J].IEEE Transactionson on Wireless Communications,2010,9(10):3072-3081 [2] Guo M H,Liaw H T,Deng D J,et al.Cluster-based securecommunication mechanism in wireless ad hoc networks[J].Net Information Security,2010,4(4):352-360 [3] Islam M R,Azad S,Morshed M M.A Secure Communication Suite for Cluster-based Underwater Surveillance Networks[C]∥2014 International Conference on IEEE Electrical Engineering and Information & Communication Technology (ICEEICT).2014:1-5 [4] Lu H,Li J,Guizani M.Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks[J].IEEE Transactions on Parallel & Distributed Systems ,2014,25(3):750-761 [5] Zhang Rui,Shi Jing,Zhang Yan-chao,et al.Secure Top-k Query Processing in Unattended[J].IEEE Transactions on Vehicular Technology,2014,3(9):4681-4693 [6] Vaidya B,Pyun J Y,Pan S,et al.Secure framework for intergrated multipath MANTE with internet[C]∥Internation Symposium on Application and the Internet.2008:83-88 [7] Bellare M,Namprempre C,Neven G.Security Proofs for Identity Based Identification and Signature Schemes[J].Journal of Cryptology,2009,22(1):1-61 [8] Yasmin R,Ritter E,Wang G.An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:882-889 [9] Kiliani H.An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update[C]∥IEEE International Conference on Advanced Information Networking & Applications.IEEE,2014:351-358 [10] Krishna R.Cookie-based acceleration of an authentication protocol:US,US8887233[P].2014 [11] Guo C,Zhang Z J,Zhu L H,et al.A novel secure group RFID authentication protocol[J].Journal of China Universities of Posts & Telecommunications,2014,21(1):94-103 [12] Yang Shi-ping.Security protocol and BAN Logic [D].Guiyang:Guizhou University,2007(in Chinese ) 杨世平.安全协议及其BAN逻辑分析研究[D].贵阳:贵州大学,2007 [13] Yang Tao.Based proxy signature vehicle from research networking privacy [D]:Beijing:Beijing University,2013(in Chinese)杨涛.基于代理签名的车辆自组网的隐私保护研究[D].北京:北京大学,2013 [14] He Dao-jing.Key Technology of wireless network security [D].Hangzhou:Zhejiang University,2012(in Chinese) 何道敬.无线网络安全的关键技术研究[D].杭州:浙江大学,2012 |
No related articles found! |
|