ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2017, Vol. 54 ›› Issue (9): 2011-2020.doi: 10.7544/issn1000-1239.2017.20160635

• 网络技术 • 上一篇    下一篇

WSN中基于椭圆曲线的可追踪匿名认证方案

常芬1,2,崔杰1,2,王良民1,3   

  1. 1(安徽大学计算机科学与技术学院 合肥 230601);2(安徽大学信息保障技术协同创新中心 合肥 230601);3(江苏大学计算机科学与通信工程学院 江苏镇江 212013) (1198813216@qq.com)
  • 出版日期: 2017-09-01
  • 基金资助: 
    国家自然科学基金项目(61472001,61272074)

A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network

Chang Fen1,2, Cui Jie1,2, Wang Liangmin1,3   

  1. 1(School of Computer Science and Technology, Anhui University, Hefei 230601);2(Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei 230601);3(School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013)
  • Online: 2017-09-01

摘要: 在无线传感器网络中,传感器节点布置在相应的应用领域,用于检测周边环境并发送检测值给Sink.消息在转发的过程中,消息的完整性及消息源的敏感信息应该受到保护.一方面,消息认证是阻止未经授权和损坏的消息转发的最有效的方法;另一方面,采用匿名通信的方式可以隐藏敏感节点的身份信息,实现节点位置的隐私保护.然而,匿名通信也为攻击者提供了利用匿名技术进行违法活动的机会.因此,追踪恶意节点的身份就显得尤为重要.为了解决无线传感器网络络中的发送节点身份隐私泄露和恶意节点追踪问题,提出基于椭圆曲线的可追踪匿名认证方案.方案将椭圆曲线和环签名相结合,实现节点匿名通信,提供中间节点的认证.仿真实验结果表明,与现有方法相比,在签名产生和认证开销相当的情况下,利用环签名的可链接特性能够实现对恶意节点的可追踪性,提高网络的性能和安全性.

关键词: 无线传感器网络, 匿名认证, 可追踪, 环签名, 公钥密码体制

Abstract: In wireless sensor network (WSN), sensor nodes are deployed in the corresponding application fields, in order to observe their environment and send their observations to the Sink. The message source should be protected in the process of transmission between nodes and Sink. On one hand, message authentication is one of the most effective ways to keep unauthorized and corrupted messages from being forwarded in wireless sensor network; on the other hand, anonymous communication can hide sensitive nodes identity information to implement the privacy protection of nodes location. However, anonymous communication has incurred a series of problems, such as, it gives the attacker an opportunity to use anonymous technology for illegal activities. Thus, it is particularly important to track the identity of the malicious nodes. In order to solve the problems above, a traceable and anonymous authentication scheme based on elliptic curve is proposed in this paper. The scheme combines elliptic curve with ring signature, implements nodes anonymous communication and provides the intermediate nodes authentication. The simulation results demonstrate that this scheme is equal to the existing schemes on the signature and certification cost. While, by using the linkable characteristics of ring signature, the proposed scheme can realize the traceability of malicious nodes, and improve the performance and security of the network.

Key words: wireless sensor network (WSN), anonymous authentication, traceability, ring signature, public-key cryptosystem

中图分类号: