ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2017, Vol. 54 ›› Issue (9): 2011-2020.doi: 10.7544/issn1000-1239.2017.20160635

Previous Articles     Next Articles

A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network

Chang Fen1,2, Cui Jie1,2, Wang Liangmin1,3   

  1. 1(School of Computer Science and Technology, Anhui University, Hefei 230601);2(Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei 230601);3(School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013)
  • Online:2017-09-01

Abstract: In wireless sensor network (WSN), sensor nodes are deployed in the corresponding application fields, in order to observe their environment and send their observations to the Sink. The message source should be protected in the process of transmission between nodes and Sink. On one hand, message authentication is one of the most effective ways to keep unauthorized and corrupted messages from being forwarded in wireless sensor network; on the other hand, anonymous communication can hide sensitive nodes identity information to implement the privacy protection of nodes location. However, anonymous communication has incurred a series of problems, such as, it gives the attacker an opportunity to use anonymous technology for illegal activities. Thus, it is particularly important to track the identity of the malicious nodes. In order to solve the problems above, a traceable and anonymous authentication scheme based on elliptic curve is proposed in this paper. The scheme combines elliptic curve with ring signature, implements nodes anonymous communication and provides the intermediate nodes authentication. The simulation results demonstrate that this scheme is equal to the existing schemes on the signature and certification cost. While, by using the linkable characteristics of ring signature, the proposed scheme can realize the traceability of malicious nodes, and improve the performance and security of the network.

Key words: wireless sensor network (WSN), anonymous authentication, traceability, ring signature, public-key cryptosystem

CLC Number: