首页 | 本学科首页   官方微博 | 高级检索  
     

无线传感器网络中基于节点行为和身份的可信认证
引用本文:刘涛,熊焰,黄文超,陆琦玮,龚旭东.无线传感器网络中基于节点行为和身份的可信认证[J].计算机应用,2013,33(7):1842-1845.
作者姓名:刘涛  熊焰  黄文超  陆琦玮  龚旭东
作者单位:1. 安徽工程大学 计算机与信息学院,安徽 芜湖241000 2. 中国科学技术大学 计算机科学与技术学院,合肥 230027
基金项目:国家自然科学基金资助项目(61170233,61232018,61272472);国家自然科学基金青年科学基金资助项目(61202404);安徽省教育厅自然科学基金资助项目(KJ2013A040, KJ2012B012);安徽省自然资金资助项目(1308085MF88)
摘    要:针对无线传感器网络(WSN)开放性和资源受限导致易受外部和内部攻击以及节点失效等问题,提出了一种高效、安全的可信节点间身份认证方案。方案采用基于身份和双线性对理论实现认证密钥协商与更新,通过基于Beta分布的节点行为信誉的管理计算其信任度,利用信任度识别节点是否可信并采用对称密码体制结合信息认证码实现可信节点间认证。方案不仅能防范窃听、注入、重放、拒绝服务等多种外部攻击,而且能够抵御选择性转发、Wormhole攻击、Sinkhole攻击和女巫攻击等内部威胁。与SPINS方案相比,所提方案在同一网络环境下有较长的网络生命期、较小的认证时延、更高的安全性及可扩展性,在无人值守安全性要求较高的WSN领域具有较好的应用价值。

关 键 词:无线传感器网络  可信认证  节点行为  基于身份  Beta分布  双线性对  
收稿时间:2013-01-22
修稿时间:2013-02-26

Node behavior and identity-based trusted authentication in wireless sensor networks
LIU Tao XIONG Yan HUANG Wenchao LU Qiwei GONG Xudong.Node behavior and identity-based trusted authentication in wireless sensor networks[J].journal of Computer Applications,2013,33(7):1842-1845.
Authors:LIU Tao XIONG Yan HUANG Wenchao LU Qiwei GONG Xudong
Affiliation:1. College of Computer Science and Technology, University of Science and Technology of China, Hefei Anhui 230027, China
2. School of Computer and Information, Anhui Polytechic University, Wuhu Anhui 241000, China
Abstract:Concerning the vulnerability to attack from external and internal nodes and node failure due to openness and limited resources in Wireless Sensor Network (WSN), an efficient, secure trusted authentication scheme was proposed. The theory of identity-based and bilinear pairings was adopted in the authentication key agreement and update. The node trust value was computed by node behavior reputation management based on Beta distribution. The symmetric cryptosystem combined with message authentication code was used in certification process between trusted nodes which were identified by the trust value. The scheme not only can prevent eavesdropping, injection, replay, denial of service and other external attacks, but also is able to withstand internal threats such as the selective forwarding, Wormhole attack, Sinkhole attack and Sybil attack. The analysis and comparison with SPINS scheme show that the scheme can achieve longer network lifetime, smaller certification delay, greater security and scalability in the same network environment. The scheme has good application value in unattended WSN with high safety requirements.
Keywords:Wireless Sensor Network (WSN)  trusted authentication  node behavior  identity-based  Beta-distribution  bilinear pairing  
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号