高级检索
    常芬, 崔杰, 王良民. WSN中基于椭圆曲线的可追踪匿名认证方案[J]. 计算机研究与发展, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635
    引用本文: 常芬, 崔杰, 王良民. WSN中基于椭圆曲线的可追踪匿名认证方案[J]. 计算机研究与发展, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635
    Chang Fen, Cui Jie, Wang Liangmin. A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635
    Citation: Chang Fen, Cui Jie, Wang Liangmin. A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635

    WSN中基于椭圆曲线的可追踪匿名认证方案

    A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network

    • 摘要: 在无线传感器网络中,传感器节点布置在相应的应用领域,用于检测周边环境并发送检测值给Sink.消息在转发的过程中,消息的完整性及消息源的敏感信息应该受到保护.一方面,消息认证是阻止未经授权和损坏的消息转发的最有效的方法;另一方面,采用匿名通信的方式可以隐藏敏感节点的身份信息,实现节点位置的隐私保护.然而,匿名通信也为攻击者提供了利用匿名技术进行违法活动的机会.因此,追踪恶意节点的身份就显得尤为重要.为了解决无线传感器网络络中的发送节点身份隐私泄露和恶意节点追踪问题,提出基于椭圆曲线的可追踪匿名认证方案.方案将椭圆曲线和环签名相结合,实现节点匿名通信,提供中间节点的认证.仿真实验结果表明,与现有方法相比,在签名产生和认证开销相当的情况下,利用环签名的可链接特性能够实现对恶意节点的可追踪性,提高网络的性能和安全性.

       

      Abstract: In wireless sensor network (WSN), sensor nodes are deployed in the corresponding application fields, in order to observe their environment and send their observations to the Sink. The message source should be protected in the process of transmission between nodes and Sink. On one hand, message authentication is one of the most effective ways to keep unauthorized and corrupted messages from being forwarded in wireless sensor network; on the other hand, anonymous communication can hide sensitive nodes identity information to implement the privacy protection of nodes location. However, anonymous communication has incurred a series of problems, such as, it gives the attacker an opportunity to use anonymous technology for illegal activities. Thus, it is particularly important to track the identity of the malicious nodes. In order to solve the problems above, a traceable and anonymous authentication scheme based on elliptic curve is proposed in this paper. The scheme combines elliptic curve with ring signature, implements nodes anonymous communication and provides the intermediate nodes authentication. The simulation results demonstrate that this scheme is equal to the existing schemes on the signature and certification cost. While, by using the linkable characteristics of ring signature, the proposed scheme can realize the traceability of malicious nodes, and improve the performance and security of the network.

       

    /

    返回文章
    返回