计算机应用 ›› 2013, Vol. 33 ›› Issue (07): 1842-1845.DOI: 10.11772/j.issn.1001-9081.2013.07.1842

• 信息安全 • 上一篇    下一篇

无线传感器网络中基于节点行为和身份的可信认证

刘涛1,2,熊焰2,黄文超2,陆琦玮2,龚旭东2   

  1. 1. 安徽工程大学 计算机与信息学院,安徽 芜湖241000
    2. 中国科学技术大学 计算机科学与技术学院,合肥 230027
  • 收稿日期:2013-01-22 修回日期:2013-02-26 出版日期:2013-07-01 发布日期:2013-07-06
  • 通讯作者: 刘涛
  • 作者简介:刘涛(1973-),女,安徽六安人,副教授,硕士,CCF会员,主要研究方向:计算机网络、信息安全; 熊焰(1960-),男,安徽合肥人,教授,博士生导师,主要研究方向:计算机网络、信息安全、移动计算、移动网络、分布式处理; 黄文超(1982-),男,湖北宜昌人,博士,主要研究方向:信息安全、移动计算; 陆琦玮(1988-),男,江苏太仓人,博士研究生,主要研究方向:移动社交网络、信息安全; 龚旭东(1988-),男,四川资阳人,博士研究生,主要研究方向:移动社交网络、数据挖掘。
  • 基金资助:

    国家自然科学基金资助项目(61170233,61232018,61272472);国家自然科学基金青年科学基金资助项目(61202404);安徽省教育厅自然科学基金资助项目(KJ2013A040, KJ2012B012);安徽省自然资金资助项目(1308085MF88)

Node behavior and identity-based trusted authentication in wireless sensor networks

LIU Tao1,2,XIONG Yan1,HUANG Wenchao1,LU Qiwei1,GONG Xudong1   

  1. 1. College of Computer Science and Technology, University of Science and Technology of China, Hefei Anhui 230027, China
    2. School of Computer and Information, Anhui Polytechic University, Wuhu Anhui 241000, China
  • Received:2013-01-22 Revised:2013-02-26 Online:2013-07-06 Published:2013-07-01
  • Contact: LIU Tao

摘要: 针对无线传感器网络(WSN)开放性和资源受限导致易受外部和内部攻击以及节点失效等问题,提出了一种高效、安全的可信节点间身份认证方案。方案采用基于身份和双线性对理论实现认证密钥协商与更新,通过基于Beta分布的节点行为信誉的管理计算其信任度,利用信任度识别节点是否可信并采用对称密码体制结合信息认证码实现可信节点间认证。方案不仅能防范窃听、注入、重放、拒绝服务等多种外部攻击,而且能够抵御选择性转发、Wormhole攻击、Sinkhole攻击和女巫攻击等内部威胁。与SPINS方案相比,所提方案在同一网络环境下有较长的网络生命期、较小的认证时延、更高的安全性及可扩展性,在无人值守安全性要求较高的WSN领域具有较好的应用价值。

关键词: 无线传感器网络, 可信认证, 节点行为, 基于身份, Beta分布, 双线性对

Abstract: Concerning the vulnerability to attack from external and internal nodes and node failure due to openness and limited resources in Wireless Sensor Network (WSN), an efficient, secure trusted authentication scheme was proposed. The theory of identity-based and bilinear pairings was adopted in the authentication key agreement and update. The node trust value was computed by node behavior reputation management based on Beta distribution. The symmetric cryptosystem combined with message authentication code was used in certification process between trusted nodes which were identified by the trust value. The scheme not only can prevent eavesdropping, injection, replay, denial of service and other external attacks, but also is able to withstand internal threats such as the selective forwarding, Wormhole attack, Sinkhole attack and Sybil attack. The analysis and comparison with SPINS scheme show that the scheme can achieve longer network lifetime, smaller certification delay, greater security and scalability in the same network environment. The scheme has good application value in unattended WSN with high safety requirements.

Key words: Wireless Sensor Network (WSN), trusted authentication, node behavior, identity-based, Beta-distribution, bilinear pairing

中图分类号: