|
- 2015
一种混合Das协议的无线传感器网络身份验证协议
|
Abstract:
摘要: 为了提高合法用户在无线传感器网络(wireless sensor networks, WSNs)中访问节点数据时的安全性,基于已有的动态认证协议和Das协议,提出了一种混合Das协议的WSNs身份验证协议(MDas)。该协议具有动态认证协议通过单向散列函数和异或运算来实现加密/解密的性能,也具有Das协议采用唯一的智能卡进行身份验证的特点。相比Das协议和动态认证协议,MDas协议增加了密码变更阶段,并且在协议的验证阶段增加了登录节点与传感器节点之间的互相验证操作,加强了身份验证的安全性。安全特性对比和计算成本分析结果表明,MDas协议可以抵御伪装网关重放攻击、伪装登陆节点攻击以及蛮力攻击,具有更好的安全性能。
Abstract: In order to improve the security of legitimate user access to the node data in the wireless sensor networks(WSNs), an authentication protocol hybrid Das protocol for wireless sensor networks was proposed. This protocol has a dynamic authentication protocol by one-way hash function and XOR operation to achieve the encryption/decryption performance, and it also has a characteristic that Das protocol using only a smart card to authenticate. Compared with Das protocol and dynamic authentication protocol, MDas protocol increases the password change phase, and also increases the mutual verification operation between the login node and sensor nodes during the verification phase of the agreement to enhance the authentication security. The analysis on protocol security features comparison and calculation cost showed that the MDas protocol can resist the attack of camouflage gateway replay,and it has the better security performance
[1] | Binod Vaidya, Jorge S Silva, Joel J P C Rodrigues. Robust dynamic user authentication scheme for w ireless sensor networks[C]//Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks.New York: ACM Press, 2009:28-29. |
[2] | VAIDYA B, RODRIGUES J J, PARK J H. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN[J]. International Journal of Communication Systems, 2010, 23(9-10):1201-1222. |
[3] | 张明. 一种改进的动态用户认证协议[J]. 电子学报, 2011, 24(6):137-139. ZHANG Ming. An improved dynamic user authentication protocol[J]. Electronic Science and Technology, 2011, 24(6):137-139. |
[4] | 李兴华, 邓凌娟, 张渊, 等. 基于博弈论的身份认证协议的分析——NGUYEN LH 方案的改进[J]. 通信学报, 2013, 34(8):18-36. LI Xinghua, DENG Lingjuan, ZHANG Yuan, et al. Rational analysis of authentication protocols based on NGUYEN LH scheme[J]. Journal on Communications, 2013, 34(8):18-36. |
[5] | WANG Chao, MAO Kefei, LIU Jianwei, et al. Identity-based dynamic authenticated group key agreement protocol for space information network[J].Lecture Notes in Computer Science, 2013, 7873:535-548. |
[6] | LI Chun-Ta, LEE Cheng-Chi, LEE Chin-Wen. An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography[J]. Sensor Letters, 2013, 11(5):958-965. |
[7] | KO Lee-Chun. A novel dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of IEEE International Symposium on Wireless Communication Systems. New York: IEEE, 2008:608-612. |
[8] | DAS M L. Efficient user authentication and secure data transmission in wireless sensor networks[C]//Proceedings of the 16th IEEE International Conference on Networks. New York: IEEE, 2008:1-6. |
[9] | KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks[J]. SENSORS, 2010, 10(3):2450-2459. |
[10] | YOO S G, PARK K Y, KIM J. A security-performance-balanced user authentication scheme for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2012, 382810:1-11. |
[11] | DONG Qi, LIU Donggang, NING Peng. Providing DoS resistance for signature-based broadcast authentication in sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2013, 12(3): 73.1-73.26. |
[12] | LIN Qiaomin, WANG Yangjunxiong, SHAO Xing, et al. Novel three-party password-based authenticated key exchange protocol for wireless sensor networks[J]//Communications in Computer and Information Science, 2013, 334:263-270. |
[13] | CHEN Tien-Ho, SHIH Wei-Kuan. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5):704-712. |
[14] | WONG K H M, ZHENG Yuan, CAO Jiannong, et al.A dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of the IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing. Los Alamitos: IEEE Computer Society, 2006:244-251. |
[15] | DYANG D H, LEE M K. Improvement of Das's two-factor authentication protocol in wireless sensor networks [EB/OL]. [2014-01-22].http://eprint.iacr.org/2009/631.pdf. |
[16] | KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10(3):2450-2459. |
[17] | SHI Wenbo, GONG Peng. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography [J]. International Journal of Distributed Sensor Networks, 2013, 730831:1-7. |