检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《计算机工程》2015年第1期126-129,共4页Computer Engineering
基 金:国家自然科学基金资助项目(61373125;61272415;61070164);广东省自然科学基金资助项目(S2011010002708;2010B090400164);暨南大学科技创新基金资助项目(11611510)
摘 要:随着无线传感器网络(WSN)的应用越来越广泛,其访问控制的安全性和隐私问题已成为研究热点。将Hash函数、消息认证码以及椭圆曲线上的点乘计算相结合,提出一种具有强匿名性的WSN访问控制方案。该方案中通信双方相互认证抵抗攻击者的伪造攻击,利用消息认证码来保证数据的完整性;同时以公平的方式生成共享的会话密钥,具有较强的抵抗伪装攻击和抵抗节点捕获攻击的能力。理论分析与评估结果表明,该方案通过引入强匿名的节点请求,实现节点请求的不相关性,增强抵抗节点捕获攻击的能力。将Hash函数与消息认证码相结合,在相同阶的计算复杂度下不增加通信成本,增强系统的安全性。With the wide application of Wireless Sensor Networks(WSN),it attracts increasing attention and its security and privacy concerns of access control are becoming important research issues. This paper proposes an access control scheme with strong anonymity by utilizing a Hash function,the message authentication code and the point multiplication calculation on an elliptic curve. It uses mutual authentication in both communication sides to resist the forgery attacks,and uses the message authentication code to ensure data integrity. Meanwhile,it generates the share session key in a fair way and has a strong resistance to node capture attacks. Theoretical analysis and evaluation result shows that the scheme achieves the uncorrelated requests between nodes by introducing node requests with strong anonymity,which can enhance the ability to resist the node capture attacks. In particular,compared with the existing schemes,combining the message authentication code with the Hash function,it is more secure and efficient in the same order of computational complexity and without increasing the cost of communication.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.113