一种改进的无线传感器网络的匿名认证与密钥协商方案
An Improved Anonymous Authentication and Key Agreement Scheme for Wireless Sensor Networks
投稿时间:2018-03-17  修订日期:2018-03-17
DOI:
中文关键词: 无线传感器网络  双向认证  密钥协商  BAN逻辑
英文关键词: wireless sensor networks  mutual authentication  key agreement  BAN logic
基金项目:国家自然科学基金项目;中南财经政法大学基本业务研究项目
作者单位E-mail
张志 中南财经政法大学信息与安全工程学院 amiee_zhang@163.com 
张巧丽 中南财经政法大学信息与安全工程学院 Chrolly@163.com 
摘要点击次数: 221
全文下载次数: 
中文摘要:
      作为物联网的重要组成部分,无线传感器网络通信技术广泛应用于军事监控、环境监测、医疗卫生和城市交通等各种领域. 然而,WSNs容易遭受无线链路的各种攻击,如窃听和篡改. 如何确保敏感或重要的信息仅为合法用户提供成为一个具有挑战性的问题. 目前提出的大多数方案无法满足无线传感器网络中的安全要求. 最近,Chang等提出一个双向认证和密钥交换方案,并证明它可以承受各种类型的攻击. 然而,本文指出Chang等的方案容易遭受离线密码猜测攻击、用户假冒攻击、传感器节点假冒攻击和修改攻击等. 此外, Chang等提出的相互认证与密钥协商方案不能支持用户匿名. 为了克服Chang等提出方案的安全缺陷,本文提出一个改进的无线传感器网络的匿名认证与密钥协商方案. 新方案在满足用户匿名的同时,抵抗Chang等方案的安全缺陷,并满足前向安全的会话密钥. 与已有的同类方案相比,该方案具有更高的安全性.
英文摘要:
      As an important part of the Internet of Things, wireless sensor networks communication technology is widely used in various fields, such as military surveillance, environmental monitoring, medical care, and urban transportation, etc. However, WSNs is vulnerable to various attacks on wireless links, such as eavesdropping and tampering. How to ensure that sensitive or important information is only available to legitimate users becomes a challenging issue. Nowadays, the most of the proposed solutions cannot meet the security requirements in wireless sensor networks. Chang et al. recently proposed a two-factor authentication and key agreement scheme, and prove that it can withstand various types of attacks. However, this paper points out that Chang et al.’s scheme is vulnerable to off-line password guessing attacks, user impersonation attacks, sensor node impersonation attacks, and modifying attacks, etc. In addition, Chang et al.’s mutual authentication and key agreement scheme cannot support the users anonymity. In order to overcome the safety deficiencies proposed by Chang et al., this paper proposes an improved anonymous authentication and key agreement scheme for wireless sensor networks. While the new scheme supports user anonymity, it can resist the defects of Chang et al.’s scheme, meet the perfect forward secrecy, which has higher security than the existing similar schemes.
View Fulltext   查看/发表评论  下载PDF阅读器
关闭