期刊文献+

一种改进的基于位置的攻击容忍WSN安全方案 被引量:3

Improved Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 基于身份的公钥体制(IBE)在无线传感网(WSN)中的安全应用越来越多,尤其是基于位置ID的攻击容忍安全方案研究已被广泛关注,但对WSN而言该方案主要面临两大问题:(1)基于双线性对的IBE计算耗费过大;(2)要求节点位置固定即不支持节点位置的移动。研究提出了一种面向WSN的轻量级IBE加密方案TinyCKE,利用ECC组合密钥实现基于ID的公钥加密机制,较基于双线性对的IBE更适用于计算资源受限的传感节点;基于TinyCKE设计改进了一种基于位置的攻击容忍安全方案,通过对节点位置范围标识及其ID私钥有效时间的统一管理,支持节点在允许范围内任意移动并支持基于ECC组合密钥的高效认证,且使恶意节点对私钥的攻击限定在一个更新周期内,具有对节点位置和私钥时间的攻击容忍性。 Identity-based encryption has been widely used for wireless sensor networks. The Research on the IBE employed location-based compromise-tolerant security mechanisms is hot. However, there are two issues for the current research on such IBE-based scheme, pairing-based computation for IBE costs so large, and location of each node is supposed to be fixed which loses the permission of node movement. In this paper, a lightweight IBE scheme named TinyCKE is firstly proposed for WSNs, which is based on ECC Combined Key Encryption and is more applicable for resource-constrained WSN nodes than that of pairing-based IBE. Using TinyCKE, an improved location-based compromise-tolerant security scheme is then proposed. It depends on the uniform management of the node location range and the private key lifetime. The proposed solution can not only support the node movements in the legitimate location ranges with lightweight ECC-based authentication supported,but also limit the possible attack of malicious node into one period of key update lifetime. It is well compromise-tolerant for both location and key validate time of nodes.
出处 《传感技术学报》 CAS CSCD 北大核心 2012年第4期545-551,共7页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61103044) 国家973基础研究计划项目(2010CB328106-3) 国家863高技术研究发展计划项目(2009AA043303) 浙江省自然科学基金项目(Y1110567) 浙江省科技计划项目项目(2010C31126 2011C21046) 北京航空航天大学软件开发环境国家重点实验室开放课题项目(SKLSDE-2011KF-07)
关键词 无线传感网 IBE ECC 基于位置 安全容忍 wireless sensor networks identity-based encryption ECC location-based compromise-tolerant
  • 相关文献

参考文献20

  • 1陈铁明,葛亮,蔡家楣,马世龙.TinyTCSec:一种新的轻量级无线传感器网络链路加密协议[J].传感技术学报,2011,24(2):275-282. 被引量:8
  • 2Zhang J,Varadharajan V. Wireless Sensor Network Key Management Survey and Taxonomy [ J ]. Journal of Network and Computer Applications ,2010,33 (2) :63-75.
  • 3Watro R, Kong D. TinyPK : Securing Sensor Networks with Public Key Technology [ C ]//SASN'04. Washington, DC, USA, ACM, 2004 : 122-133.
  • 4David J, Matt W, Smith D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[ C ]// IEEE International Conference on Sensor and Ad Hoc Communications and Networks(SECON04). Piscataway IEEE ,2004 :289-302.
  • 5Wang H,Sheng B, Li Q. Elliptic Curve Cryptography Based Access Control in Sensor Networks [ J ]. International Journal of Security and Networks ,2007,1 ( 3/4 ) : 127-137.
  • 6Wang H, Li Q. Efficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes [ R ]. Technical Report, WM-CS-2006-7, Dept. of Comp. and Info. Sci. ,Cleveland State University.
  • 7Liu A, Kampanakis P, Ning P. TinyECC: Elliptic Curve Cryptography for Sensor Networks ( Version 0. 3 ) [ R]. http:// discovery, csc. ncsu. edu/software/TinyECC/, February 2007.
  • 8Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing[ C ]//Crypto' 2001. LNCS2139, Springer- Verlag, 2001 : 213-229.
  • 9Hoeper K,Gong G. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation [ R ]. Technical Report CACR 2006-04, Centre for Applied Cryptographic Research, Waterloo, Canada ,January 2006.
  • 10Zhang Y, Liu W. Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks [ J ]. IEEE Journal of Selected Areas in Communications,2006,24 (2) : 247-260.

二级参考文献22

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks [J]. Wireless Networks, 2002, 8(5):521-534.
  • 3Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks [C]// 2nd ACM SensSys, 2004,162-175.
  • 4Gura N , Patel A , Wander A , et al. Comparing Elliptic Curve Cryptography and R SA on 8-bit CPUs[C]//Workshop on Cryptographic Hardware and Embedded Systems, 2004, 119-132.
  • 5Malan D J, Welsh M, and Smith M Do A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//IEEE International Conference on Sensor and Ad Hoe Communications and Networks, Santa Clara, California, 2004,71-80.
  • 6Zhang Y, Liu W, Lou W, and Fang Y. Securing Sensor Networks with Location-Based Keys[C]// IEEE Wireless Communications and Networking Conference. 2005, 1909-1914.
  • 7Doyle B, Bell S, Smeaton A F, McCusker K, et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks [J]. The Computer Journal, 2006, 49(4): 443-453.
  • 8McCusker K, Connor N, and Diamond D. Low-Energy Finite Field Arithmetic Primitives for Implementing Security in Wireless Sensor Networks[J]. Communication, Circuits And Systems Proceedings, 2006,1537-1541.
  • 9Oliveira L B, Dahab R, Lopez J, et al. Identity-Encryption for Sensor Networks[C]// 3rd IEEE PerCom Workshop on Pervasive Wireless Networking, March 2007,876-884.
  • 10Watro R, Kong D, at al. TinyPK..Securing Sensor Networks with Public Key Technology[C]//SASN' 04 (ACM), Washington DC, 2004, 322-339.

共引文献10

同被引文献48

  • 1Novotny M. Formal Analysis of Security Protocols for WirelessSensor Networks[ J]. Tatra Mt Math Publ,2010,47 :81 -97.
  • 2Clarke E M. The Birth of Model Checking[ M]. 25 Years of ModelChecking. Heidelberg : Springer,2008 : 1 -26.
  • 3Holzmann G J. The Spin Model Checker Primer and ReferenceManual [ M]. New Jersey : Addison Wesley ,2003.
  • 4SMV home page,http://www. cs. emu.edu/ -modelcheck/smv. html.
  • 5Kim G Larsen, Paul Pettersson, Wang Yi. Uppaal in a Nutshell[J]. International Journal on Software Tools for TechnologyTransfer, 1997 ,1 (2) : 134-152.
  • 6Llanos Tobarra, Diego Cazorla, Fernando Cuartero, et al. ModelChecking Wireless Sensor Network Security Protocols : TinySec +LEAP[ J]. IFIP International Federation for Information Processing,2007,248:95-106.
  • 7Ballarini P,Miller A. Model Checking Medium Access Control forSensor Networks [ C]//Second International Symposium onLeveraging Applications of Formal Methods, Verification andValidation,15-19 Nov.2006,255-262.
  • 8Fehnker Ansgar, van Hoesel Lodewijk, Mader Angelika, et al.Modelling and Verification of the LMAC Protocol for WirelessSensor Networks [ C]//6th International Intergrated FormalMethods Conference Oxford,UK,2-5 July,2007,253-272.
  • 9Fehnker A, Fruth M, Mclver A K. Graphical Modelling forSimulation and Formal Analysis of Wireless Network Protocols[M]. Methods, Models and Tools for Fault Tolerance, Heidelberg:Springer,2009 : 1 -24.
  • 10Zhang Y, Liu W. Location-Based Compromise-Tolerant SecurityMechanisms for Wireless Sensor Networks [ J]. IEEE JournalofSelected Areas in Communications,2006,24(2) :247-260.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部