计算机科学 ›› 2023, Vol. 50 ›› Issue (5): 363-371.doi: 10.11896/jsjkx.220400193
张凌浩1, 唐勇1, 邓东2, 刘洋洋2, 唐超1, 桂盛霖2
ZHANG Linghao1, TANG Yong1, DENG Dong2, LIU Yangyang2, TANG Chao1, GUI Shenglin2
摘要: 认证和秘钥协商协议是解决无线传感器网络中设备安全通信的主流方法,而目前主流的无线传感器网络秘钥协商协议考虑的场景为对等节点之间的认证和协商,存在计算量高、通信效率低的问题。针对以上问题,提出了适用于异构无线传感器网络中的认证与秘钥管理协议,通信终端节点(L节点)双方首先与各自所在簇的管理节点(H节点)协商会话秘钥,若未通过身份认证,则拒绝L节点接入网络,解决了大多数协议缺少应对拒绝服务攻击的问题;然后借助通信路径所经过的H节点转发会话秘钥协商信息,完成通信双方端到端的会话秘钥协商,使得协议具有安全网关和访问控制的能力。该协议还支持对被捕获节点的节点注销,并减少对其他通信链路安全性的影响。基于求解椭圆曲线上的离散对数问题和Diffie-Hellman问题的困难性假设,在随机预言机模型中证明了该方案可以满足前向安全、抗秘钥泄露伪装攻击、未知秘钥共享安全、无秘钥托管、已知秘钥安全等更完整的安全属性,与已有文献相比,所提协议在应对拒绝服务攻击上具有最低的计算开销,整体计算量和通信量适中。
中图分类号:
[1]HUANG H,GONG T,YE N,et al.Private and secured medical data transmission and analysis for wireless sensing healthcare system[J].IEEE Transactions on Industrial Informatics,2017,13(3):1227-1237. [2]KE Z,KAI X,FUSHAN W.A Provably Secure AnonymousAuthenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks[J].Wireless Communications and Mobile Computing,2018,2018:1-9. [3]SAMIR A,AZEDDINE B,DJALLEL E B.EDAK:An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs[J].Future Generation Computer Systems,2019,92(2019):789-799. [4]WU C,HUANG H,ZHOU K,et al.Cryptanalysis and improvement of a new certificateless signature scheme in the standard model[J].China Communications,2021,18(1):151-160. [5]WU J D,TSENG Y M,HUANG S S.An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage[J].IEEE Systems Journal,2019,13(4):3968-3979. [6]AL-RIYAMI S S,PATERSON K G.Certificateless public keycryptography[C]//9th International Conference on the Theory and Application of Cryptology and Information Security.Taipei,China,2003:452-473. [7]HUANG X Y,WILLY S,YI M,et al.On the security of a certificateless signature scheme[C]//Proceedings of the CANS 2005.Xiamen,China,2005:13-25. [8]SWANSON C,JAO D.A Study of Two-Party CertificatelessAuthenticated Key-Agreement Protocols[C]//Proceedings of International Conference on Cryptology in India:Progress in Cryptology.New Delhi,India,2009:57-71. [9]LAMACCHIA B,LAUTER K,MITYAGIN A.Stronger Secu-rity of Authenticated Key Exchange[C]//Proceedings of International Conference on Provable Security.Wollong,Australia,2007:1-16. [10]MANDT T K,TAN C H.Certificateless Authenticated Two-Party Key Agreement Protocols[C]//Proceedings of Advances in Computer Science-ASIAN 2006.Secure Software and Rela-ted Issues,11th Asian Computing Science Conference.Tokyo,Japan:Springer-Verlag,2006:37-44. [11]WANG S B,CAO Z G,WANG L C,et al.Efficient certificateless authenticated key agreement protocol from pairings[J].Wuhan University Journal of Natural Science,2006,11(5):1278-1282. [12]SHAO Z H.Efficient authenticate key agreement protocol using self-certified public keys from pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. [13]SHI Y,LI J H.Two-party authenticated key agreement in certificateless public key cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. [14]LIU W H,XU C X.Two Party Certificateless Key Agreement Schemes[J].Journal of Software,2011,22(11):2843-2852. [15]ZHOU Y W,YANG B,ZHANG W Z.An Improved Two-Party Authenticated Certificateless Key Agreement Protocol[J].Chinese Journal of Computers,2017,40(5):1181-1191. [16]SEO S H,WON J,SULTANA S.Effective Key Management in Dynamic Wireless Sensor Networks[J].IEEE Transactions on Information Forensics and Security,2015,10(2):371-383. [17]XU S W,REN X P,CHEN C,et al.Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol[J].Journal of Cryptologic Research,2020,7(6):886-898. [18]WU T,JING X.Two-party certificateless authenticated keyagreement protocol with enhanced security[J].The Journal of China Universities of Posts and Telecommunications(English version),2019,26(1):12-20. [19]LI N,DONG Y,CHE T,et al.Research and improvement on certificateless authenticated key agreement[J].Engineering Journal of Wuhan University,2017,50(1):146-149. [20]ZENG P,GUO R F,MA Y J,et al.Provable Security Certificateless Authentication Scheme for Vehicular Ad hoc Network[J].Journal of Electronics and Information Technology,2020,42(12):2873-2881. [21]HE D B,CHEN Y T,CHEN J H,et al.A new two-round certi-ficateless authenticated key agreement protocol without bilinear pairings[J].Mathematical & Computer Modelling,2011,54(11/12):3143-3152. [22]ZHANG L,ZHANG F T.A Method to Construct a Class ofCertificateless Signature Schemes[J].Chinese Journal of Computers,2009,32(5):940-945. [23]CUI W,CHENG R,WU K,et al.A Certificateless Authenticated Key Agreement Scheme for the Power IoT[J].Energies,2021,14(19):6317. [24]TEDESCHI P,SCIANCALEPORE S,ELIYAN A,et al.LiKe:Lightweight certificateless key agreement for secure IoT communications[J].IEEE Internet of Things Journal,2019,7(1):621-638. |
[1] | 黄丽, 朱焱, 李春平. 基于异构网络表征学习的作者学术行为预测 Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning 计算机科学, 2022, 49(9): 76-82. https://doi.org/10.11896/jsjkx.210900078 |
[2] | 蒲实, 赵卫东. 一种面向动态科研网络的社区检测算法 Community Detection Algorithm for Dynamic Academic Network 计算机科学, 2022, 49(1): 89-94. https://doi.org/10.11896/jsjkx.210100023 |
[3] | 程云飞, 田红心, 刘祖军. NOMA系统异构网络中联合用户关联和功率控制协同优化 Collaborative Optimization of Joint User Association and Power Control in NOMA Heterogeneous Network 计算机科学, 2021, 48(3): 269-274. https://doi.org/10.11896/jsjkx.191100213 |
[4] | 肖勇, 金鑫, 冯俊豪. 一种适用于电力异构通信的链路速率跨层匹配机制 Cross-layer Matching Mechanism of Link Communication Rate for Heterogeneous Communication in Power System 计算机科学, 2021, 48(11A): 495-499. https://doi.org/10.11896/jsjkx.200500113 |
[5] | 曾德泽, 李跃鹏, 赵宇阳, 顾琳. 基于强化学习的高能效基站动态调度方法 Reinforcement Learning Based Dynamic Basestation Orchestration for High Energy Efficiency 计算机科学, 2021, 48(11): 363-371. https://doi.org/10.11896/jsjkx.201000008 |
[6] | 叶胜男, 陈建华. 一个强安全的无证书签名方案的分析和改进 Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme 计算机科学, 2021, 48(10): 272-277. https://doi.org/10.11896/jsjkx.201200117 |
[7] | 方旭愿, 田红心, 孙德春, 杜文丛, 祁婷. 基于绿色能源感知的效用函数异构网络接入算法 Utility Function Heterogeneous Network Access Algorithm Based on Green Energy Perception 计算机科学, 2019, 46(8): 127-132. https://doi.org/10.11896/j.issn.1002-137X.2019.08.021 |
[8] | 左黎明, 陈祚松, 夏萍萍, 汤鹏志, 康文洋. 一种改进的高效无证书短签名方案 Improved Efficient Certificateless Short Signature Scheme 计算机科学, 2019, 46(4): 172-176. https://doi.org/10.11896/j.issn.1002-137X.2019.04.027 |
[9] | 张建安. 基于移动切换认证的分层异构网络中的用户敏感信息隐藏方法 Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication 计算机科学, 2019, 46(3): 217-220. https://doi.org/10.11896/j.issn.1002-137X.2019.03.032 |
[10] | 张绘娟, 张达敏, 闫威, 陈忠云, 辛梓芸. 异构网络中基于吞吐量优化的资源分配机制 Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks 计算机科学, 2019, 46(10): 109-115. https://doi.org/10.11896/jsjkx.180901787 |
[11] | 庄陵,尹耀虎. 认知异构网络中基于不完全频谱感知的资源分配算法 Resource Allocation Algorithm for Cognitive Heterogeneous Networks Based on Imperfect Spectrum Sensing 计算机科学, 2018, 45(5): 49-53. https://doi.org/10.11896/j.issn.1002-137X.2018.05.008 |
[12] | 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案 Path Optimization Scheme for Restraining Degree of Disorder in CMT 计算机科学, 2018, 45(4): 122-125. https://doi.org/10.11896/j.issn.1002-137X.2018.04.019 |
[13] | 王瑞云,赵国磊,常朝稳,王雪健. 典型安全网关的形式化设计与证明 Formal Design and Verification for Typical Security Gateway 计算机科学, 2017, 44(9): 142-147. https://doi.org/10.11896/j.issn.1002-137X.2017.09.028 |
[14] | 高秀娥,李克秋. 基于改进多属性判决的异构网络接入选择算法 Research on Heterogeneous Network Access Selection Algorithm Based on Improved Multiple Attribute 计算机科学, 2017, 44(6): 97-101. https://doi.org/10.11896/j.issn.1002-137X.2017.06.017 |
[15] | 吴卫祖,刘利群,谢冬青. 基于神经网络的异构网络向量化表示方法 Vectorized Representation of Heterogeneous Network Based on Neural Networks 计算机科学, 2017, 44(5): 272-275. https://doi.org/10.11896/j.issn.1002-137X.2017.05.049 |
|