首页 | 本学科首页   官方微博 | 高级检索  
     

WSNs中基于秘密共享的身份认证协议
引用本文:杨清华,汪烈军,刘琦.WSNs中基于秘密共享的身份认证协议[J].四川激光,2014(5):39-41.
作者姓名:杨清华  汪烈军  刘琦
作者单位:新疆大学信息科学与工程学院,乌鲁木齐830046
基金项目:新疆维吾尔自治区自然科学基金资助(2013211A012);新疆研究生科研创新项目资助(XJGRI2013038)
摘    要:身份认证是无线传感器网络安全的第一道屏障。针对现有无线传感器网络中的身份认证协议的效率和安全问题,基于Shamir门限秘密共享方案提出一种低功耗的身份认证协议。在不降低网络安全性的前提下,通过多个已认证节点对新节点进行身份认证,能够有效的降低认证过程中的计算量。认证过程中使用单向散列函数对通信数据进行加密并且运用时间戳机制抵御重放攻击。分析结果表明协议具有低功耗的特点,并且能够抵御窃听攻击、重放攻击以及少数节点被俘虏的攻击。

关 键 词:无线传感器网络  身份认证  门限秘密共享方案  时间戳机制  散列函数

An ID authentication scheme base on secret sharing in wireless sensor networks
Affiliation:YANG Qing-Hua, WANG Lie-Jun, WANG Ming-Wei (School of Information Science and Engineering, Xinjiang University, Urumqi 830046, China)
Abstract:Identity authentication is the first safeguard for security of wireless sensor networks(WSNs). For the existing efficiency and safety issues of identity authentication protocol in WSNs, a low-power identity authentication protocol which is based on Shamir threshold secret sharing scheme is proposed.In the premise of not compromising the network's security, the new node need to be authenticated by the majority of authorized nodes, therefore, the consumption of computation can be reduced effectively during the process of authentication. One-way hash function is used for encrypting communication data and also the timestamp mechanism for being against reply attacks in authentication process. Analytical results show that the protocol is low-power consumption and has the ability of resisting eavesdropping attacks, replaying attack and attack of a few nodes being captured.
Keywords:Wireless sensor networks(WSNs)  Identity authentication  Secret sharing scheme  Timestamp mechanism  Hash
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号