山东大学学报(理学版) ›› 2015, Vol. 50 ›› Issue (05): 12-17.doi: 10.6040/j.issn.1671-9352.0.2014.431
万智萍
WAN Zhi-ping
摘要: 为了提高合法用户在无线传感器网络(wireless sensor networks, WSNs)中访问节点数据时的安全性,基于已有的动态认证协议和Das协议,提出了一种混合Das协议的WSNs身份验证协议(MDas)。该协议具有动态认证协议通过单向散列函数和异或运算来实现加密/解密的性能,也具有Das协议采用唯一的智能卡进行身份验证的特点。相比Das协议和动态认证协议,MDas协议增加了密码变更阶段,并且在协议的验证阶段增加了登录节点与传感器节点之间的互相验证操作,加强了身份验证的安全性。安全特性对比和计算成本分析结果表明,MDas协议可以抵御伪装网关重放攻击、伪装登陆节点攻击以及蛮力攻击,具有更好的安全性能。
中图分类号:
[1] 张明. 一种改进的动态用户认证协议[J]. 电子学报, 2011, 24(6):137-139. ZHANG Ming. An improved dynamic user authentication protocol[J]. Electronic Science and Technology, 2011, 24(6):137-139. [2] 李兴华, 邓凌娟, 张渊, 等. 基于博弈论的身份认证协议的分析——NGUYEN LH 方案的改进[J]. 通信学报, 2013, 34(8):18-36. LI Xinghua, DENG Lingjuan, ZHANG Yuan, et al. Rational analysis of authentication protocols based on NGUYEN LH scheme[J]. Journal on Communications, 2013, 34(8):18-36. [3] WANG Chao, MAO Kefei, LIU Jianwei, et al. Identity-based dynamic authenticated group key agreement protocol for space information network[J].Lecture Notes in Computer Science, 2013, 7873:535-548. [4] LI Chun-Ta, LEE Cheng-Chi, LEE Chin-Wen. An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography[J]. Sensor Letters, 2013, 11(5):958-965. [5] WONG K H M, ZHENG Yuan, CAO Jiannong, et al.A dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of the IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing. Los Alamitos: IEEE Computer Society, 2006:244-251. [6] Binod Vaidya, Jorge S Silva, Joel J P C Rodrigues. Robust dynamic user authentication scheme for w ireless sensor networks[C]//Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks.New York: ACM Press, 2009:28-29. [7] KO Lee-Chun. A novel dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of IEEE International Symposium on Wireless Communication Systems. New York: IEEE, 2008:608-612. [8] DAS M L. Efficient user authentication and secure data transmission in wireless sensor networks[C]//Proceedings of the 16th IEEE International Conference on Networks. New York: IEEE, 2008:1-6. [9] KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks[J]. SENSORS, 2010, 10(3):2450-2459. [10] DYANG D H, LEE M K. Improvement of Das's two-factor authentication protocol in wireless sensor networks [EB/OL]. [2014-01-22].http://eprint.iacr.org/2009/631.pdf. [11] VAIDYA B, RODRIGUES J J, PARK J H. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN[J]. International Journal of Communication Systems, 2010, 23(9-10):1201-1222. [12] KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10(3):2450-2459. [13] SHI Wenbo, GONG Peng. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography [J]. International Journal of Distributed Sensor Networks, 2013, 730831:1-7. [14] YOO S G, PARK K Y, KIM J. A security-performance-balanced user authentication scheme for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2012, 382810:1-11. [15] DONG Qi, LIU Donggang, NING Peng. Providing DoS resistance for signature-based broadcast authentication in sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2013, 12(3): 73.1-73.26. [16] LIN Qiaomin, WANG Yangjunxiong, SHAO Xing, et al. Novel three-party password-based authenticated key exchange protocol for wireless sensor networks[J]//Communications in Computer and Information Science, 2013, 334:263-270. [17] CHEN Tien-Ho, SHIH Wei-Kuan. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5):704-712. |
[1] | 及歆荣,侯翠琴,侯义斌,赵斌. 基于筛选机制的L1核学习机分布式训练方法[J]. 山东大学学报(理学版), 2016, 51(9): 137-144. |
[2] | 周先存, 黎明曦, 李瑞霞, 徐明鹃, 凌海波. 多点协作复制攻击检测研究[J]. 山东大学学报(理学版), 2015, 50(07): 54-65. |
[3] | 张晶, 薛冷, 崔毅, 容会, 王剑平. 基于无线传感器网络的双混沌数据加密算法建模与评价[J]. 山东大学学报(理学版), 2015, 50(03): 1-5. |
[4] | 李国庆. 无线传感器网络基于联系数的信任评估模型[J]. 山东大学学报(理学版), 2014, 49(09): 123-128. |
[5] | 赵泽茂1,刘洋1,张帆1,2,周建钦1,张品1. 基于角度和概率的WSN源位置隐私保护路由研究[J]. J4, 2013, 48(09): 1-9. |
[6] | 万润泽1,雷建军1,袁操2. 基于模糊聚类理论的无线传感器节点休眠优化策略[J]. J4, 2013, 48(09): 17-21. |
[7] | 吕家亮1,2,3,王英龙1,3,崔焕庆1,魏诺2,3,郭强2,3. 基于微粒群优化的三维无线传感网定位算法研究[J]. J4, 2013, 48(05): 78-82. |
[8] | 崔焕庆1,2,王英龙1*,吕家亮1,2,魏诺1. 基于随机微粒群算法的分布式节点定位方法[J]. J4, 2012, 47(9): 51-55. |
[9] | 郭晓东1,杜鹏1,张雪芬2. 一种WSN中能量有效的分布式检测和功率分配算法[J]. J4, 2012, 47(9): 60-64. |
[10] | 刘梦君,刘树波*,刘泓晖,蔡朝晖,涂国庆. 异构无线传感器网络动态混合密钥管理方案研究[J]. J4, 2012, 47(11): 67-73. |
[11] | 姚武军1,丁谊1,魏立线1,杨晓元1,2. 基于RSSI的无线传感器网络ARQ差错控制策略[J]. J4, 2011, 46(9): 61-66. |
[12] | 李桂青,高仲合,王楠楠. 基于簇头集的无线传感器网络定向扩散协议[J]. J4, 2010, 45(11): 37-42. |
[13] | 周书旺1,2,3,王英龙1,3,郭强1,2,魏诺1,2,郭文娟1,3. 一种考虑可能区域和智能搜索相结合的定位算法[J]. J4, 2010, 45(11): 27-31. |
[14] | 郭文娟1,2,王英龙1,2,魏诺1,3,郭强1,3,周书旺1,2,3. 基于卡尔曼滤波的无线传感器网络时钟同步协议[J]. J4, 2010, 45(11): 32-36. |
[15] | 周书旺 王英龙 郭强 魏诺. 基于微粒群算法的无线传感器网络节点定位方法[J]. J4, 2009, 44(9): 52-55. |
|