Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (8): 2481-2486.DOI: 10.11772/j.issn.1001-9081.2021061127
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Hongliang TIAN(), Jiayue WANG, Chenxi LI
Received:
2021-06-30
Revised:
2021-08-24
Accepted:
2021-08-26
Online:
2021-10-18
Published:
2022-08-10
Contact:
Hongliang TIAN
About author:
TIAN Hongliang, born in 1981, Ph. D., associate professor. His main research interests include internet of things, blockchain, online monitoring of power equipment.通讯作者:
田洪亮
作者简介:
田洪亮(1981—),男,吉林吉林人,副教授,博士,主要研究方向:物联网、区块链、电力设备在线监测;CLC Number:
Hongliang TIAN, Jiayue WANG, Chenxi LI. Data storage scheme based on hybrid algorithm blockchain and node identity authentication[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
田洪亮, 王佳玥, 李晨曦. 基于混合算法区块链和节点身份认证的数据存储方案[J]. 《计算机应用》唯一官方网站, 2022, 42(8): 2481-2486.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021061127
符号 | 描述 |
---|---|
第k个传感器节点 | |
第j个簇头 | |
第k个普通传感器节点的遮罩密码 | |
初始伪密钥标识 | |
第j个簇头的遮罩密码 | |
簇头的伪标识 | |
签名函数的私钥 | |
签名函数的公钥 | |
传感器节点的密钥 | |
基站的新时间戳 | |
基站的新私钥 |
Tab. 1 Main parameters and their description
符号 | 描述 |
---|---|
第k个传感器节点 | |
第j个簇头 | |
第k个普通传感器节点的遮罩密码 | |
初始伪密钥标识 | |
第j个簇头的遮罩密码 | |
簇头的伪标识 | |
签名函数的私钥 | |
签名函数的公钥 | |
传感器节点的密钥 | |
基站的新时间戳 | |
基站的新私钥 |
参数 | 设置 |
---|---|
传感器节点数量 | 100~ 400 |
簇头占比 | 20% |
感测范围 | 100 m×100 m ~ 400 m×400 m |
通信范围 | 60 m |
数据包大小 | 512 B |
信道带宽 | 6 Mb/s |
仿真时长 | 100 s |
Tab. 2 Description of simulation parameters
参数 | 设置 |
---|---|
传感器节点数量 | 100~ 400 |
簇头占比 | 20% |
感测范围 | 100 m×100 m ~ 400 m×400 m |
通信范围 | 60 m |
数据包大小 | 512 B |
信道带宽 | 6 Mb/s |
仿真时长 | 100 s |
方案 | 数据包签名计算开销 | 数据包验证计算开销 | 加密计算开销 | 总的计算开销 |
---|---|---|---|---|
KDE-DA | TMAC+ 2TMUL+Thash | 2TPAR | TENC | TMAC+ 2TMUL+ Thash+2TPAR+ TENC |
BIM | 2TMAC | TMAC | 2TENC | 3TMAC+2TENC |
DBE | TMAC+ 7Thash | TMAC+ Thash | 2TPAR+ TMUL+ 2TENC | 2TMAC+ 9Thash+ 2TPAR + TMUL+ 2TENC |
本文方案 | 2Thash+TMAC | TMAC | 2TPAR + TMUL+ Thash+TENC | 3Thash+2 TMAC+2TPAR+ TMUL+ TENC |
Tab. 3 Computational overhead of different schemes
方案 | 数据包签名计算开销 | 数据包验证计算开销 | 加密计算开销 | 总的计算开销 |
---|---|---|---|---|
KDE-DA | TMAC+ 2TMUL+Thash | 2TPAR | TENC | TMAC+ 2TMUL+ Thash+2TPAR+ TENC |
BIM | 2TMAC | TMAC | 2TENC | 3TMAC+2TENC |
DBE | TMAC+ 7Thash | TMAC+ Thash | 2TPAR+ TMUL+ 2TENC | 2TMAC+ 9Thash+ 2TPAR + TMUL+ 2TENC |
本文方案 | 2Thash+TMAC | TMAC | 2TPAR + TMUL+ Thash+TENC | 3Thash+2 TMAC+2TPAR+ TMUL+ TENC |
特征 | BIM | DBE | KDE-DA | 本文方案 |
---|---|---|---|---|
传感器身份验证 | × | √ | √ | √ |
密码更新 | × | √ | √ | √ |
系统密钥更新 | × | × | × | √ |
节点撤销 | × | × | × | √ |
去中心化 | √ | √ | × | √ |
透明性 | √ | × | √ | √ |
多介质存储 | √ | × | × | √ |
Tab. 4 Comparison of characteristics of different schemes
特征 | BIM | DBE | KDE-DA | 本文方案 |
---|---|---|---|---|
传感器身份验证 | × | √ | √ | √ |
密码更新 | × | √ | √ | √ |
系统密钥更新 | × | × | × | √ |
节点撤销 | × | × | × | √ |
去中心化 | √ | √ | × | √ |
透明性 | √ | × | √ | √ |
多介质存储 | √ | × | × | √ |
攻击类型 | BIM | KDE-DA | DBE | 本文方案 |
---|---|---|---|---|
重放攻击 | √ | √ | √ | √ |
消息篡改和生成攻击 | × | √ | √ | √ |
抵赖攻击 | √ | × | √ | √ |
冒名攻击 | × | × | √ | √ |
入侵传感器节点 | × | √ | × | √ |
私人数据泄露攻击 | × | √ | × | √ |
Tab. 5 Security comparison of different schemes
攻击类型 | BIM | KDE-DA | DBE | 本文方案 |
---|---|---|---|---|
重放攻击 | √ | √ | √ | √ |
消息篡改和生成攻击 | × | √ | √ | √ |
抵赖攻击 | √ | × | √ | √ |
冒名攻击 | × | × | √ | √ |
入侵传感器节点 | × | √ | × | √ |
私人数据泄露攻击 | × | √ | × | √ |
1 | 袁驰.基于身份的动态层簇式无线传感网络认证算法[J].计算机应用, 2020, 40(11): 3236-3241. 10.11772/j.issn.1001-9081.2020030400 |
YUAN C. Identity-based dynamic clustering authentication algorithm for wireless sensor networks[J]. Journal of Computer Applications, 2020, 40(11): 3236-3241. 10.11772/j.issn.1001-9081.2020030400 | |
2 | WANG J, CAO Y Q, LI B, et al. Particle swarm optimization based clustering algorithm with mobile sink for WSNs[J]. Future Generations Computer Systems, 2017, 76: 452-457. 10.1016/j.future.2016.08.004 |
3 | BUTTYAN L, GESSNER D, HESSLER A, et al. Application of wireless sensor networks in critical infrastructure protection: challenges and design options [J]. IEEE Wireless Communications, 2010, 17(5): 44-49. 10.1109/mwc.2010.5601957 |
4 | 任志玲,张广全,林冬,等.无线传感器网络应用综述[J].传感器与微系统, 2018, 37(3): 1-2, 10. |
REN Z L, ZHANG G Q, LIN D, et al. Review on application of WSNs[J]. Transducer and Microsystem Technologies, 2018, 37(3): 1-2, 10. | |
5 | 谢英英,石涧,黄硕康,等.面向5G的命名数据网络物联网研究综述[J].计算机科学, 2020, 47(4): 217-225. 10.11896/jsjkx.191000157 |
XIE Y Y, SHI J, HUANG S K, et al. Survey on Internet of Things based on named data networking facing 5G[J]. Computer Science, 2020, 47(4): 217-225. 10.11896/jsjkx.191000157 | |
6 | MAITI P, SHUKLA J, SAHOO B, et al. Efficient data collection for IoT services in edge computing environment [C]// Proceedings of the 2017 International Conference on Information Technology. Piscataway: IEEE, 2017: 101-106. 10.1109/icit.2017.40 |
7 | XIONG J B, CHEN L, BHUIYAN M Z A, et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis[J]. Future Generation Computer Systems, 2020, 111: 741-753. 10.1016/j.future.2019.10.017 |
8 | 张远方.分层无线传感网络用户认证技术研究[D].南京:东南大学, 2016: 26-35. 10.21629/jsee.2017.01.19 |
ZHANG Y F. Research on user authentication technology in hierarchical wireless sensor network[D]. Nanjing: Southeast University, 2016: 26-35. 10.21629/jsee.2017.01.19 | |
9 | 王辉,刘玉祥,曹顺湘,等.融入区块链技术的医疗数据存储机制[J].计算机科学, 2020, 47(4): 285-291. 10.11896/jsjkx.190400001 |
WANG H, LIU Y X, CAO S X, et al. Medical data storage mechanism integrating blockchain technology[J]. Computer Science, 2020, 47(4): 285-291. 10.11896/jsjkx.190400001 | |
10 | KIM T H, GOYAT R, RAI M K, et al. A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks[J]. IEEE Access, 2019, 7: 184133-184144. 10.1109/access.2019.2960609 |
11 | 周致成,李立新,李作辉.基于区块链技术的高效跨域认证方案[J].计算机应用, 2018, 38(2): 316-320, 326. |
ZHOU Z C, LI L X, LI Z H. Efficient cross-domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018, 38(2): 316-320, 326. | |
12 | 西门子公司.防篡改地建立密钥的方法和系统:中国, 200780014690.4[P]. 2007-05-06. 10.17265/1537-1506/2007.05 |
SIEMENS. Method and system for the manipulation protected generation of a cryptographic key: China, 200780014690.4[P]. 2007-05-06. 10.17265/1537-1506/2007.05 | |
13 | 付烁,徐海霞,李佩丽,等.数字货币的匿名性研究[J].计算机学报, 2019, 42(5): 1045-1062. |
FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency[J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062. | |
14 | PUTHAL D, MALIK N, MOHANTY S P, et al. The blockchain as a decentralized security framework [J]. IEEE Consumer Electronics Magazine, 2018, 7(2): 18-21. 10.1109/mce.2017.2776459 |
15 | 汪和平.椭圆曲线加密IP核的设计与实现[D].哈尔滨:哈尔滨工业大学, 2012: 19-27. |
WANG H P. Design and implementation of elliptic curve encryption IP core[D]. Harbin: Harbin Institute of Technology, 2012: 19-27. | |
16 | 赵梁,李磊,李向丽.基于双序列函数的重放攻击防御方案[J].计算机工程, 2020, 46(9): 143-148. |
ZHAO L, LI L, LI X L. Replay attack defense scheme based on double sequence function[J]. Computer Engineering, 2020, 46(9): 143-148. | |
17 | 陈华,习伟,范丽敏,等.密码产品的侧信道分析与评估[J].电子与信息学报, 2020, 42(8): 1836-1845. 10.11999/JEIT190853 |
CHEN H, XI W, FAN L M, et al. Side channel analysis and evaluation on cryptographic products[J]. Journal of Electronics and Information Technology, 2020, 42(8): 1836-1845. 10.11999/JEIT190853 | |
18 | BALA S, SHARMA G, VERMA A K. Impersonation attack on CertificateLess key agreement protocol[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2018, 27(2): 108-120. 10.1504/ijahuc.2018.089580 |
19 | CHEN X H, MIZERA A, PANG J. Activity tracking: a new attack on location privacy [C]// Proceedings of the 2015 IEEE Conference on Communications and Network Security. Piscataway: IEEE, 2015: 22-30. 10.1109/cns.2015.7346806 |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO. Application of improved hunter-prey optimization algorithm in WSN coverage [J]. Journal of Computer Applications, 2024, 44(8): 2506-2513. |
[4] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[5] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[6] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[7] | Han SHEN, Zhongsheng WANG, Zhou ZHOU, Changyuan WANG. Improved DV-Hop localization model based on multi-scenario [J]. Journal of Computer Applications, 2024, 44(4): 1219-1227. |
[8] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[9] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[10] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[11] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[12] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[13] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[14] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
[15] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||