通信学报 ›› 2012, Vol. 33 ›› Issue (2): 30-35.doi: 1000-436X(2012)02-0030-06

• 学术论文 • 上一篇    下一篇

无线传感器网络的轻量级安全体系研究

王潮1,2,胡广跃1,张焕国2,3   

  1. 1 上海大学 特种光纤与光接入网省部共建重点实验室,上海200072
    2 空天信息安全与可信计算教育部重点实验室,湖北 武汉430072
    3 武汉大学 计算机学院,湖北 武汉430072
  • 出版日期:2012-02-25 发布日期:2017-08-04
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;空天信息安全与可信计算教育部重点实验室开放基金资助项目;上海市重点学科和科委重点实验室基金资助项目;上海市重点学科和科委重点实验室基金资助项目

Lightweight security architecture design for wireless sensor network

Chao WANG1,2,Guang-yue HU1,Huan-guo ZHANG2,3   

  1. 1 Shanghai University Key Lab of Specialty Fiber Optics and Optical Access Network,Shanghai 200072,China
    2 Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education,Wuhan 430072,China
    3 Computer School of Wuhan University,Wuhan 430072,China
  • Online:2012-02-25 Published:2017-08-04
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Key Laboratory Open Fund of Sky Information Security and Trusted Computing;Shanghai Key Subject and Committee of Science and Technology of Key Laboratory;Shanghai Key Subject and Committee of Science and Technology of Key Laboratory

摘要:

结合无线传感器网络现有的安全方案存在密钥管理和安全认证效率低等问题的特点,提出了无线传感器网络的轻量级安全体系和安全算法。采用门限秘密共享机制的思想解决了无线传感器网络组网中遭遇恶意节点的问题;采用轻量化ECC算法改造传统ECC算法,优化基于ECC的CPK体制的思想,在无需第三方认证中心CA的参与下,可减少认证过程中的计算开销和通信开销,密钥管理适应无线传感器网络的资源受限和传输能耗相当于计算能耗千倍等特点,安全性依赖于椭圆离散对数的指数级分解计算复杂度;并采用双向认证的方式改造,保证普通节点与簇头节点间的通信安全,抵御中间人攻击。

关键词: 无线传感器网络, 认证, 密钥管理, 轻量级ECC

Abstract:

Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.

Key words: wireless sensor network, authentication, key management, lightweight ECC

No Suggested Reading articles found!