作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2015, Vol. 41 ›› Issue (1): 126-129. doi: 10.3969/j.issn.1000-3428.2015.01.023

• 安全技术 • 上一篇    下一篇

一种具有强匿名性的无线传感器网络访问控制方案

陈婷,卢建朱,江俊晖   

  1. 暨南大学信息科学技术学院,广州 510632
  • 收稿日期:2013-12-10 修回日期:2014-02-04 出版日期:2015-01-15 发布日期:2015-01-16
  • 作者简介:陈 婷(1987-),女,硕士研究生,主研方向:信息安全,网络通信;卢建朱,副教授、博士;江俊晖,硕士。
  • 基金资助:
    国家自然科学基金资助项目(61373125,61272415,61070164);广东省自然科学基金资助项目(S2011010002708,2010B090400164);暨南大学科技创新基金资助项目(11611510)

An Access Control Scheme with Strong Anonymity in Wireless Sensor Network

CHEN Ting,LU Jianzhu,JIANG Junhui   

  1. College of Information Science and Technology,Jinan University,Guangzhou 510632,China
  • Received:2013-12-10 Revised:2014-02-04 Online:2015-01-15 Published:2015-01-16

摘要: 随着无线传感器网络(WSN)的应用越来越广泛,其访问控制的安全性和隐私问题已成为研究热点。将Hash函数、消息认证码以及椭圆曲线上的点乘计算相结合,提出一种具有强匿名性的WSN访问控制方案。该方案中通信双方相互认证抵抗攻击者的伪造攻击,利用消息认证码来保证数据的完整性;同时以公平的方式生成共享的会话密钥,具有较强的抵抗伪装攻击和抵抗节点捕获攻击的能力。理论分析与评估结果表明,该方案通过引入强匿名的节点请求,实现节点请求的不相关性,增强抵抗节点捕获攻击的能力。将Hash函数与消息认证码相结合,在相同阶的计算复杂度下不增加通信成本,增强系统的安全性。

关键词: 无线传感器网络, 访问控制, 强匿名性, 认证, 安全

Abstract: With the wide application of Wireless Sensor Networks(WSN),it attracts increasing attention and its security and privacy concerns of access control are becoming important research issues.This paper proposes an access control scheme with strong anonymity by utilizing a Hash function,the message authentication code and the point multiplication calculation on an elliptic curve.It uses mutual authentication in both communication sides to resist the forgery attacks,and uses the message authentication code to ensure data integrity.Meanwhile,it generates the share session key in a fair way and has a strong resistance to node capture attacks.Theoretical analysis and evaluation result shows that the scheme achieves the uncorrelated requests between nodes by introducing node requests with strong anonymity,which can enhance the ability to resist the node capture attacks.In particular,compared with the existing schemes,combining the message authentication code with the Hash function,it is more secure and efficient in the same order of computational complexity and without increasing the cost of communication.

Key words: Wireless Sensor Network(WSN), access control, strong anonymity, authentication, security

中图分类号: