期刊文献+

基于WSN安全的用户认证协议 被引量:1

User authentication scheme based on security in wireless sensor networks
在线阅读 下载PDF
导出
摘要 随着无线传感器网路的迅速发展,其安全问题变得很重要。在传感器网络的许多应用(如军事目标的检测和跟踪等)中,如何防止非法用户的入侵来保证网络的安全运行是亟待解决的问题。因此,提出了一种基于无线传感器网络的用户认证协议,并对其安全性和成本两方面进行了分析,可以看出该协议具有一定的可行性。 With rapid development of the wireless sensor network, its security problem becomes more and more important. In sensor network many applications (such as military target examination and track and etc), how to prevent the illegal user from invading to gua- rantee network running safely is need to solve urgently. Therefore, a sort of user authentication schedule based on the wireless sensor network security is proposed, and its security and the cost are analyzed. From it, this schedule has certain feasibility.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第23期5640-5642,5808,共4页 Computer Engineering and Design
关键词 无线传感器网络 安全威胁 安全需求 数据认证 用户认证 wireless sensor network safe threat security requirement data certification user authentication
  • 相关文献

参考文献9

  • 1Blaze M, Feigenbaum J, bannidis J, et al The role of trust management in distributed systems security[C]. Secure Intemet Programming Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999,185-210.
  • 2Josang A. A model for trust in security systems[EB/OL]. Proceedings of the 2nd Nordic Workshop on Secure Computer Systems,http://security.dstc.edu.au/staff/ajosang/papers.html,1999.
  • 3Amit K Awasthi. On the authentication of the user from the remote autonomous object [J]. International Journal of Network Security, 2005,1 (3): 168-169.
  • 4Manik Lal Das, Ashutosh Aaxena, Ved P Gulati. A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics,2004,50(2):629-631.
  • 5Lee Cheng-Chi, Hwang Min-Shiang, Yang Wei-Pang. A flexible remote user authentication scheme using smart cards[J]. ACM Operatiing Systems Review,2002,36(3):46-52.
  • 6Awasthi A, Lal S. A new remote user authentication scheme using smart cards with check digits[J]. Manuscript,2005,24(3): 32-43.
  • 7Lee C Y, Lin C H, Chang C C. An improved low communication cost user authentication scheme for mobile communication[C].Taiwan: Proceedings of the IEEE 19th International Conference on Advanced Information Networking and Applications, 2005.
  • 8Sastry N, Wagner D. Security considerations for IEEE 802.15.4 network[C]. Philadelphia,PA,USA: ACM Workshop on Wireless Security, 2004.
  • 9Wu S T, Chieu B C. Cryptanalysis of a user friendly remote authentication scheme with smart cards[J]. Computer & Security, 2003,22(6):547-427.

同被引文献8

  • 1A.Joux."A one-round protocol for tripartite DiffieHellman" Algorithm Number Theory Symposium-ANTS IV,Lecture Notes on Computer Sciences 1838,pp.385-394,SpringerVerlag,2000.
  • 2D.Boneh,M.Franklin."Identity-based encryption from the Weil pairing" Advanced in Cryptology-Crypto2001,Lecture Notes on Computer Sciences 2139,pp.213-229,SpringerVerlag,2001.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C].Proceeding of Crypto84.1985,47-53.
  • 4Moisés Salinas R,Gina Gallegos G,Gonzalo Duchén S.An Authentication Protocol for Sensor Networks using Pairings.2009 International Conference on Electrical,Communications,and Computers[C].26-28 Feb,2009,pp.168-172.
  • 5Marco Pugliese,Fortunato Santucci.Pair-wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks using Vector Algebra.5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems[C].Sept.29-Oct.2.2008,pp.853-859.
  • 6Wang Wei-hong,Cui Yi-ling,Chen Tie-ming.Identitybased Authentication protocol with Paringof Tate on WSN.5th International Conference on Wireless Communications,Networking and Mobile Computing[C] ,24-26 Sept.2009,pp.1-4.
  • 7曹雪菲,寇卫东,樊凯,张军.无双线性对的基于身份的认证密钥协商协议[J].电子与信息学报,2009,31(5):1241-1244. 被引量:17
  • 8王丽琴,杨晓元,黎茂棠.基于双线性对的WSN密钥管理和认证方案[J].计算机应用研究,2009,26(11):4302-4305. 被引量:7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部