作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2025, Vol. 51 ›› Issue (11): 186-193. doi: 10.19678/j.issn.1000-3428.0069545

• 网络空间安全 • 上一篇    下一篇

增强的无线传感器网络认证密钥协商协议

邓淼磊1,2, 马晴雨1,2, 宋庆1,2,*(), 张春燕1,2, 左志斌1,2   

  1. 1. 河南工业大学信息科学与工程学院, 河南 郑州 450001
    2. 河南省粮食信息处理国际联合实验室, 河南 郑州 450001
  • 收稿日期:2024-03-12 修回日期:2024-06-03 出版日期:2025-11-15 发布日期:2024-08-08
  • 通讯作者: 宋庆
  • 基金资助:
    国家自然科学基金(62276091); 河南省科技攻关项目(232102210132)

Enhanced Wireless Sensor Network Authentication Key Agreement Protocol

DENG Miaolei1,2, MA Qingyu1,2, SONG Qing1,2,*(), ZHANG Chunyan1,2, ZUO Zhibin1,2   

  1. 1. College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001, Henan, China
    2. Henan International Joint Laboratory of Grain Information Processing, Zhengzhou 450001, Henan, China
  • Received:2024-03-12 Revised:2024-06-03 Online:2025-11-15 Published:2024-08-08
  • Contact: SONG Qing

摘要:

数据传输的安全问题是无线传感器网络(WSN)面临的最主要的安全威胁之一, 认证密钥协商(AKA)协议是解决此问题的有效方法。为解决现有协议不抗离线密钥猜测攻击、重放攻击的问题, 提出一种增强的无线传感器网络认证密钥协商协议。该协议基于椭圆曲线密码学(ECC), 实现了传感器节点与服务器之间安全的会话密钥协商。通过BAN(Burrows—Abadi—Needham)逻辑和非形式化安全性分析, 证明了该协议具有相互认证性、完美前向安全性, 能有效抵御离线密钥猜测和重放攻击等。在安全属性、计算开销和通信开销3个方面与现有轻量级AKA协议进行对比, 性能分析结果表明, 相比于现有协议, 该协议不仅满足WSN轻量级要求, 而且具备更强的安全属性和通信优势。

关键词: 椭圆曲线密码学, 身份认证, 数字签名, 密钥协商, BAN逻辑

Abstract:

Security of data transmission is one of the most significant security threats faced by Wireless Sensor Network (WSN), for which the Authentication Key Agreement (AKA) protocol is an effective solution. However, existing protocols are not resistant to offline key guessing and replay attacks. Therefore, an enhanced AKA protocol, which is based on Elliptic Curve Cryptography (ECC), is proposed for WSN in this paper to realize secure session key negotiation between sensor nodes and the server. Through Burrows—Abadi—Needham (BAN) logic and non-formal security analysis, mutual authentication of the protocol is proven to provide perfect forward security, effectively resisting offline key guessing and replay attacks. Comparing this protocol with existing lightweight AKA protocols in terms of security attributes, computational overhead, and communication overhead, the performance analysis results show that the proposed protocol not only meets the lightweight requirements of WSN but also has stronger security attributes and communication advantages.

Key words: Elliptic Curve Cryptography (ECC), authentication, digital signatures, key agreement, Burrows—Abadi—Needham (BAN) logic