[1]王 牧,亢保元,景东亚.无线传感器网络中身份认证与密钥共识方案[J].计算机技术与发展,2017,27(12):98-102.[doi:10.3969/ j. issn.1673-629X.2017.12.022]
 WANG Mu,KANG Bao-yuan,JING Dong-ya.An Identity Authentication and Key Agreement Scheme for Wireless Sensor Network[J].Computer Technology and Development,2017,27(12):98-102.[doi:10.3969/ j. issn.1673-629X.2017.12.022]
点击复制

无线传感器网络中身份认证与密钥共识方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年12期
页码:
98-102
栏目:
安全与防范
出版日期:
2017-12-10

文章信息/Info

Title:
An Identity Authentication and Key Agreement Scheme for Wireless Sensor Network
文章编号:
1673-629X(2017)12-0098-05
作者:
王 牧亢保元景东亚
天津工业大学 计算机科学与软件学院,天津 300387
Author(s):
WANG MuKANG Bao-yuanJING Dong-ya
School of Computer Science and Software Engineering,Tianjin Polytechnic University,
Tianjin 300387,China
关键词:
身份认证密钥共识传感器网络安全性
Keywords:
identity authenticationkey agreementwireless sensor networksecurity
分类号:
TP918
DOI:
10.3969/ j. issn.1673-629X.2017.12.022
文献标志码:
A
摘要:
随着无线通信技术的飞速发展,无线传感器网络(WSN)已经在军事、环境检测、工业以及医疗等领域得到广泛应用,且逐渐成为最有潜力的技术之一。 然而,因为无线传感器网络是通过无线信道传送信息,传感器节点通常是部署在无人看管的环境中并且受到计算能力和能量的限制,所以无线传感器网络比起传统网络更容易受到各种各样的攻击。 最近Sheetal Kalra 提出一种无线传感器网络中基于口令的认证方案,并声称这个方案可以抵抗各种攻击。 但是,Sheetal Kalra的方案容易受到来自用户的假冒攻击。 文中提出了一种安全高效的基于口令的身份认证与密钥共识方案,并给出了安全性分析,以此证明该方案可以满足无线传感器网络中的安全需求。
Abstract:
With rapid development of wireless communication technology,Wireless Sensor Network (WSN),as one of most gradually potential technologies,can be widely used in various fields such as military,environmental detection,industrial control,and medical monitoring. However,WSN is vulnerable to various attacks than traditional ones because it transmits data by using a wireless channel,and the sensors are commonly deployed in unattended environment and limited with computational and the energy resources. Recently,Sheetal
Kalra proposed an advanced password based authentication scheme for wireless sensor network and claimed that it is secure against vari ous type of security attacks. But it is subjected to impersonation attack from the users. For this,a password-based authentication and key agreement scheme for wireless sensor network is proposed. Through security analysis,it is proved that the proposed scheme is more suitable for providing security for various applications in WSN.

相似文献/References:

[1]田志英 廖晓群 赵安新.校园网认证计费系统的研究与实现[J].计算机技术与发展,2010,(05):202.
 TIAN Zhi-ying,LIAO Xiao-qun,ZHAO An-xin.Research and Implementation of Campus Network Authentication and Accounting System[J].Computer Technology and Development,2010,(12):202.
[2]万久士 李翔 林祥.基于JSSh实现身份认证网站信息采集[J].计算机技术与发展,2009,(10):156.
 WAN Jiu-shi,LI Xiang,LIN Xiang.Information Collection of Website which Achieve Identity Authentication Based on JSSh[J].Computer Technology and Development,2009,(12):156.
[3]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].Computer Technology and Development,2009,(12):181.
[4]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
 LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].Computer Technology and Development,2009,(12):158.
[5]孙印杰 陈智芳 王敏 洪力.基于指纹和数字水印的网络身份认证系统研究[J].计算机技术与发展,2008,(04):147.
 SUN Yin-jie,CHEN Zhi-fang,WANG Min,et al.Research of Authentication System Based on Fingerprint and Digital Watermarking[J].Computer Technology and Development,2008,(12):147.
[6]黄叶珏 陈勤.Web网站统一口令认证系统的设计与实现[J].计算机技术与发展,2007,(06):163.
 HUANG Ye-jue,CHEN Qin.Design and Implementation of Web Site Universal Password Authentication System[J].Computer Technology and Development,2007,(12):163.
[7]徐小平 尹颖禹.基于数字签名的身份认证模型的一种方案[J].计算机技术与发展,2006,(02):220.
 XU Xiao-ping,YIN Ying-yu.A Model Scheme for Identity Verification Based on Digital Signature[J].Computer Technology and Development,2006,(12):220.
[8]范宏生 叶震 侯保花.基于公钥密码体制的Kerberos协议的改进[J].计算机技术与发展,2006,(04):224.
 FAN Hong-sheng,YE Zhen,HOU Bao-hua.Improvement of Kerberos Protocol Based on Public Key Cryptosystem[J].Computer Technology and Development,2006,(12):224.
[9]刘建明 贺占庄.硬盘加密和身份认证的硬件实现[J].计算机技术与发展,2006,(06):139.
 LIU Jian-ming,HE Zhan-zhuang.A Hardware Design of Harddisk Encryption and Identification[J].Computer Technology and Development,2006,(12):139.
[10]张球河 李也白 王宇鸽 尹天明.电子政务资源安全管理的研究与应用[J].计算机技术与发展,2006,(09):222.
 ZHANG Qiu-he,LI Ye-bai,WANG Yu-ge,et al.Research and Application of E- Government Resource Security Management[J].Computer Technology and Development,2006,(12):222.

更新日期/Last Update: 2018-03-06