首页 | 本学科首页   官方微博 | 高级检索  
     

基于簇的水声传感器网络的安全认证协议
引用本文:任超群,徐明.基于簇的水声传感器网络的安全认证协议[J].计算机科学,2016,43(10):166-171.
作者姓名:任超群  徐明
作者单位:上海海事大学信息工程学院 上海201306,上海海事大学信息工程学院 上海201306;同济大学电子与信息工程学院 上海201804
基金项目:本文受国家自然科学基金项目(61202370),上海市教委科研创新项目(14YZ110),中国博士后科学基金资助
摘    要:近年来,基于簇的水声传感器网络得到广泛应用。由于水声传感器多用于军事行业,使得提高水声传感器网络的安全性变得十分重要。针对提高水声传感器网络安全性这一问题,提出了结合ECC Diffie-Hellman密钥交换、一元高阶多项式、双线性映射和哈希函数的安全认证协议。经过分析,该协议满足了认证、访问控制、数据保密性、数据完整性和不可否认性等安全需求。结合BAN逻辑进行形式化分析,证明该协议是安全的;同时,将协议的两个阶段分别与同类型认证协议进行对比,实验结果表明,所提协议的性能在时间或者空间上有所提升。

关 键 词:水声传感器  认证协议  双线性映射  BAN逻辑
收稿时间:2015/9/26 0:00:00
修稿时间:3/6/2016 12:00:00 AM

Security Authentication Protocol Based on Cluster for Underwater Acoustic Sensor Networks
REN Chao-qun and XU Ming.Security Authentication Protocol Based on Cluster for Underwater Acoustic Sensor Networks[J].Computer Science,2016,43(10):166-171.
Authors:REN Chao-qun and XU Ming
Affiliation:College of Information Engineering,Shanghai Maritime University,Shanghai 201306,China and College of Information Engineering,Shanghai Maritime University,Shanghai 201306,China;College of Electronics and Information Engineering,Tongji University,Shanghai 201804,China
Abstract:In recent years,the application of underwater acoustic sensor networks based on cluster is widely used.The underwater acoustic sensor is mainly used in military industry,which emphasizes the importance of safety.In order to improve the safety of underwater acoustic sensor networks,this paper presented a secure authentication protocol,which combines the ECC Diffie-Hellman key exchange,single variable higher order polynomial bilinear mapping and hash function.After analyzing,this protocol satisfies safety requirements in authentication,access control,data confidentiality,data integrity and non-repudiation.This protocol is proved to be secure when combined with BAN logic formal analysis.In addition,the two stages of this protocol are compared with the same type certification protocol separately.The comparison results show that the performance of this protocol is improved in time and space.
Keywords:Underwater acoustic sensor  Authentication protocol  Bilinear mapping  BAN logic
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号