首页 | 本学科首页   官方微博 | 高级检索  
     

无线传感器网络中具有匿名性的用户认证协议
引用本文:刘聪,高峰修,马传贵,魏福山. 无线传感器网络中具有匿名性的用户认证协议[J]. 计算机工程, 2012, 38(22): 99-103
作者姓名:刘聪  高峰修  马传贵  魏福山
作者单位:郑州信息科技学院信息研究系,郑州,450002
摘    要:对He等人提出的无线传感器网络用户认证协议(Ad-Hoc Sensor Wireless Networks, 2010, No.4)进行研究,指出该协议无法实现用户匿名性,不能抵抗用户仿冒攻击和网关节点旁路攻击,并利用高效的对称密码算法和单向hash函数对其进行改进。理论分析结果证明,改进协议可以实现用户匿名性、不可追踪性及实体认证,抵抗离线字典攻击、用户仿冒攻击和网关节点旁路攻击,与同类协议相比,计算效率更高。

关 键 词:无线传感器网络  用户认证  密钥协商  隐私保护  匿名性  不可追踪性
收稿时间:2012-02-23
修稿时间:2012-03-20

User Authentication Protocol with Anonymity in Wireless Sensor Network
LIU Cong , GAO Feng-xiu , MA Chuan-gui , WEI Fu-shan. User Authentication Protocol with Anonymity in Wireless Sensor Network[J]. Computer Engineering, 2012, 38(22): 99-103
Authors:LIU Cong    GAO Feng-xiu    MA Chuan-gui    WEI Fu-shan
Affiliation:(Department of Information Research, Zhengzhou Information Science and Technology Institute, Zhengzhou 450002, China)
Abstract:This paper researches an user authentication scheme of Wireless Sensor Network(WSN) proposed by He et al, points out that it has some security weaknesses such as lacking user anonymity, vulnerability to user impersonation attacks and GW-node bypassing attacks, and provides an improved user authentication scheme based on one-way hash function and symmetric cryptosystem. Analytical results prove that the scheme not only achieves user anonymity, untraceability and entity authentication, but also can resist off-line dictionary attacks, user impersonation attacks and GW-node bypassing attacks. Compared to other related authentication schemes, it satisfies more reasonable computational consumption.
Keywords:Wireless Sensor Network(WSN)  user authentication  key agreement  privacy preservation  anonymity  untraceability
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号