微波EDA网,见证研发工程师的成长!
首页 > 射频和无线通信 > 射频无线通信文库 > WSNs中基于三因素节点评估的安全认证方案

WSNs中基于三因素节点评估的安全认证方案

时间:07-08 来源:电子产品世界 点击:

证。安全性分析、性能分析和仿真实验的结果表明,该方案有效地提高了节点所提供信息的真实性和准确性,并且与之前的许多认证方案相比,它具有更高的安全性,很适合无线传感器网络。通过该方案,平衡了整个过程的能量消耗,从而更好地应对针对无线传感器网络的安全攻击。未来的工作是进一步地完善该认证方案的性能,使其能够在无线传感器网络中得到广泛地应用。

参考文献:

[1]向亦宏, 朱燕民. 无线传感器网络中高效建立干扰模型的研究[J]. 计算机工程, 2014, 40(8): 1-5.

[2]Watro R, Kong D, Cuti S, et al. TinyPK: securing sensor networks with public key technology[C].Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. Washington,USA:ACM, 2004,59-64.

[3]Wong K H M, Zheng Yuan, Cao Jiannong, et al. A dynamic user authentication scheme for wireless sensor networks[C].Sensor Networks, Ubiquitous, and Trustworthy Computing.Taiwan: IEEE,2006,1-8.

[4]Das M L. Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 2009, 8(3): 1086-1090.

[5]Chen Tienho, Shih W K. A robust mutual authentication protocol for wireless sensor networks[J]. Etri Journal, 2010, 32(5): 704-712.

[6]Kumar P, Choudhury A J, Sain M, et al. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.

[7]Qi Aiqin, Shen Yongjun. An authentication protocol based on Chinese remainder theorem in wireless sensor networks[C].Conference Anthology, IEEE. Lanzhou,China:IEEE, 2013,1-3.

[8]马力,郑国宁,孙朋.节点信任度模型的算法研究设计[J].计算机科学,2012, 39(B06): 81-85.

[9]Gu Chengjie, Zhang Shunyi, Feng Huibin, et al. A novel trust management model for P2P network with reputation and risk evaluation[C].E-Business and E-Government (ICEE).Nanjing,China:IEEE,2010,3544-3547.

[10]Wu Guowei, Du Zhuang, Hu Yibo, et al. A dynamic trust model exploiting the time slice in WSNs[J]. Soft Computing, 2014, 18(9): 1829-1840.

[11]Messerges T S, Dabbish E A, Sloan R H. Examining smart-card security under the threat of power analysis attacks[J]. Computers, IEEE Transactions on, 2002, 51(5): 541-552.

[12]Shah M D, Gala S N, Shekokar N M. Lightweight authentication protocol used in Wireless Sensor Network[C].Circuits, Systems, Communication and Information Technology Applications (CSCITA).Mumbai,India:IEEE,,2014:,138-143.

[13]Delgado-Mohatar O, Fúster-Sabater A, Sierra J M. A light-weight authentication scheme for wireless sensor networks[J].Ad Hoc Networks, 2011, 9(5): 727-735.

[14]Yu Yanli, Li Keqiu, Zhou Wanlei, et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures[J]. Journal of Network and Computer Applications,2012,35(3): 867-880.

[15]Lee C C, Hsu C W. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps[J]. Nonlinear Dynamics, 2013, 71(1-2): 201-211.

Copyright © 2017-2020 微波EDA网 版权所有

网站地图

Top