首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security‐performance‐balanced user authentication scheme for WSNs, which is an enhancement of existing schemes. In this paper, we show that Yoo and others' scheme has security flaws, and it is not efficient for real WSNs. In addition, this paper proposes a new strong authentication scheme with user privacy for WSNs. The proposed scheme not only achieves end‐party mutual authentication (that is, between the user and the sensor node) but also establishes a dynamic session key. The proposed scheme preserves the security features of Yoo and others' scheme and other existing schemes and provides more practical security services. Additionally, the efficiency of the proposed scheme is more appropriate for real‐world WSNs applications.  相似文献   

2.
3.
In modern, wireless sensor networks (WSNs) stand for the next evolutionary and innovative development step in utilities, industrial, building, home, shipboard, and transportation systems automation. The feature of WSNs is easy to deploy and has wide range of applications. Therefore, in distributed and unattended locations, WSNs are deployed to allow a legitimated user to login to the network and access data. Consequently, the authentication between users and sensor nodes has become one of the important security issues. In 2009, M. L. Das proposed a two-factor authentication for WSNs. Based on one-way hash function and exclusive-OR operation, the scheme is well-suited for resource constrained environments. Later, Khan and Algahathbar pointed out the flaws and vulnerabilities of Das’s scheme and proposed an alternative scheme. However, Vaidya et al. found that both Das’s and Khan–Algahathbar’s schemes are vulnerable to various attacks including stolen smart card attacks. Further, Vaidya et al. proposed an improved two-factor user authentication to overcome the security weakness of both schemes. In this paper, we show that Vaidya et al.’s scheme still exposes to a malicious insider attack that seriously threatens the security of WSNs. Furthermore, we propose an improve scheme that mends those vulnerabilities.  相似文献   

4.
Wireless Personal Communications - The wireless sensor networks are very vulnerable environments for network attacks, so that they require appropriate security measures must be implemented. The...  相似文献   

5.
张凯 《无线电工程》2012,42(11):7-9,61
节点部署是无线传感器网络的基本问题之一,关系到网络的感知范围和信息传输服务质量。现有的部署算法需要额外探测和修复边界上的覆盖空洞,从而增加了网络部署的成本而且使得节点分布不均匀。针对这一问题,提出了一种改进的节点部署方案,首先进行边界部署,以保证边界上的完全覆盖和连通;然后在感应区域内生成一个新的凸多边形区域,在此新区域上再递归调用边界部署算法,直到整个感应区域被完全覆盖。理论分析和仿真实验表明,在部署节点个数和可扩展性方面均优于已有的部署方案。  相似文献   

6.
姜奇  马卓  马建峰  李光松 《中国通信》2012,9(10):103-111
In order to remedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a smart card, and provides more security guarantees in two aspects: 1) it addresses the untraceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offline attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.  相似文献   

7.
Wireless Personal Communications - Due to the open environment in which hierarchical wireless sensor networks (HWSNs) are typically deployed, it is important to authenticate transmitted data. In...  相似文献   

8.
Wireless Personal Communications - Wireless body sensor networks are now very popular for modern healthcare applications like health monitoring, remote healthcare, emergency healthcare etc. This...  相似文献   

9.
黄捷  刘嘉勇 《通信技术》2010,43(10):111-112,116
由于网络安全的需要,利用智能卡的双因子身份鉴别方案越来越受到重视。首先分析了Wang Yan-yan等人提出的基于动态ID的远程用户身份认证方案的安全性,指出其方案的安全缺陷是不能抵抗离线的口令猜测攻击;随后提出了一种改进的方案,改进之后的方案能有效抵抗重放攻击、离线口令猜测攻击、假冒服务器/用户攻击。经过安全分析,新的方案在保留了原方案优点的同时,具有了更高的安全性。  相似文献   

10.
基于动态ID远程用户身份认证方案的改进   总被引:1,自引:0,他引:1  
杨晓辉 《电子技术》2014,(6):40-42,34
对Wang提出的动态ID远程用户身份认证方案进行了回顾和分析,指出了Wang方案中存在不能保护用户匿名和不能抗拒绝服务攻击的缺陷。针对此缺陷,在保留原方案优点的基础上提出了一种改进的动态ID远程用户身份认证方案,并通过对比分析说明了改进方案的安全性和有效性。  相似文献   

11.
媒体接入控制协议(MAC)是影响无线传感器网络能量效率的重要方面,SMAC是其中具有代表性的方案。SMAC无法实现调度表的全网同步,只能形成多个在局部范围内同步的簇,簇间边界节点相对于内部节点能量消耗要快。针对这一问题提出了一种改进的MAC方案,利用调度表的全网同步来实现簇的合并,消除了边界节点,提高了MAC层的能量效率,使网络连通性得到提高。仿真证明了方案的有效性和可扩展性。本方案同时满足无线传感器网络分布式和经济性的要求。  相似文献   

12.
When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authentication and key agreement scheme preserving the privacy of secret keys and providing user anonymity. Later, Chang et al. indicated that their scheme suffers from two security flaws. First, it cannot resist DoS (denial-of-service) attack because the indicators for the next session are not consistent. Second, the user password may be modified by a malicious attacker because no authentication mechanism is applied before the user password is updated. To eliminate the security flaws and preserve the advantages of Wang et al.'s scheme, we propose an improvement in this paper.  相似文献   

13.
一种基于ID的传感器网络密钥管理方案   总被引:1,自引:0,他引:1  
对偶密钥的建立是无线传感器网络的安全基础,它使得节点之间能够进行安全通信。但是由于节点资源的限制,传统的密钥管理方法在传感器网络中并不适用。在分析了现有密钥预分配协议的前提下,该文提出一种新的基于ID的密钥预分配协议。此协议用计算和比较散列值的方式替代广播方式协商密钥,减少了传感器节点大量的通信消耗。然后,分析了所提出方案的安全性、通信量和计算量,并和已有协议进行了比较。结果表明本文的方法不仅能保证安全性,而且节约了大量通信资源。  相似文献   

14.
一种有效的无线传感器网络密钥协商方案   总被引:4,自引:0,他引:4       下载免费PDF全文
杨庚  程宏兵 《电子学报》2008,36(7):1389-1395
 针对无线传感器网络能量、计算能力、存储空间以及带宽等局限性问题,提出了一种适合无线传感器网络的密钥协商方案EKASFWSN(Efficient Key Agreement Scheme for Wireless Sensor Networks).该方案首先运用身份加密(IBE)算法预置网络系统参数并通过计算获得节点的相关参数;然后节点使用组播技术向邻居节点广播其ID号并利用Diffie-Hellman密钥交换技术和IBE算法安全地交换节点间的相关参数、计算节点的密钥;最后利用计算获得的节点间共享密钥使用对称密码方法对网络消息进行加、解密.与目前在WSNS研究中比较流行的传统网络密钥协商方案进行的理论分析和仿真实验,结果表明:EKASFWSN方案较好的解决了无线传感器网络在计算能力、能量、存储空间和带宽等方面的局限性问题;并通过密钥交换和身份加密等技术提高了节点通信的安全.  相似文献   

15.
16.
为了提高无需测距的距离矢量(DV-Hop)定位算法对随机分布网络节点的定位精度。在分析了DV-Hop算法实现思想的基础上,提出了一种锚节点整体均匀分布优化方案,对该算法节点跳数进行优化。另一方面,在双通信半径算法基础上提出了一种三通信半径改进方法,使得两节点之间的跳数与距离的关系更接近线性规律,最后结合两种改进方法,进行整体仿真。仿真结果表明,锚节点均匀分布的三通信半径DV-Hop算法比双通信半径DV-Hop算法提高定位精度约为7%~8%。  相似文献   

17.
一种改进的无线传感器网络分簇路由协议   总被引:2,自引:1,他引:1  
针对无线传感器网络中节点能量受限的特征,提出了ILEACH(improved-LEACH)分簇路由协议,达到延长网络生存时间的目的,该分簇路由协议在簇头选取时,充分考虑了节点的剩余能量;簇形成时利用了距离阈值的约束来优化分簇方案;数据收集阶段,根据节点的权值在簇头节点之间建立到基站的路由树,利用NS2仿真软件对LEACH和ILEACH协议进行仿真、比较,结果显示ILEACH具有良好的性能.  相似文献   

18.
Wireless Personal Communications - Internet of Things has drastically expanded the global network for information exchange, because thousands of communication devices are becoming part of the...  相似文献   

19.
We study the problem of assigning clusterheads in a hierarchical Wireless Sensor Network (WSN). That is, for a given hierarchical WSN, how many clusterhead nodes we should assign, and how to geographically allocate these clusterheads. Since an assignment scheme optimizing all factors is impossible, we will focus on the crucial issue of energy efficiency of the WSN. Because it is mostly true that the nodes of WSN are powered by batteries, power saving is an especially important consideration in WSN architecture design. We will propose a hierarchical WSN architecture toward the end of saving energy of both sensor nodes and clusterheads. Using analytical result, experiments are conducted in which realistic scenarios are simulated.
Dajin WangEmail:
  相似文献   

20.
设计安全合理的密钥管理方法是解决无线传感器网络安全性问题的核心内容。基于Exclusion Basis System (EBS)的动态密钥管理方法由于安全性高,动态性能好,节约存储资源,受到了广泛关注。但同时存在共谋问题,即对于被捕获节点通过共享各自信息实施的联合攻击抵抗性较差。针对这一问题,该文利用一种特殊形式的三元多项式(同化三元多项式)密钥取代EBS系统中的普通密钥,并在分簇式的网络拓扑结构基础上,设计了一种基于EBS的无线传感器网络动态密钥管理方法。仿真与分析结果表明,相比于采用普通密钥或是二元多项式密钥的方法,该文方法不仅可以有效地解决共谋问题,提高网络对被捕获节点的抵抗性,而且显著减低了更新密钥过程中的能量消耗。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号