首页 | 官方网站   微博 | 高级检索  
     

An efficient authentication scheme based on one-way key chain for sensor network
作者姓名:郎为民  程文青  杨宗凯
作者单位:PLA University of Communication Commanding,Dept. of Electronic and Information Engineering Huazhong University of Science and Technology,Dept. of Electronic and Information Engineering,Huazhong University of Science and Technology,Wuhan 430010,China Dept. of Electronic and Information Engineering,Huazhong University of Science and Technology,Wuhan 430074,China,Wuhan 430074,China,Wuhan 430074,China
摘    要:To strike a tradeoff between the security and the consumption of energy,computing and communication resources in the nodes,this paper presents an efficient authentication scheme based on one-way key chain for sensor network. The scheme can provide immediate authentication to fulfill the latency and the storage requirements and defends against various attacks such as replay,impersonation and denial of service. Meanwhile,our scheme possesses low overhead and scalability to large networks. Furthermore,the simple related protocols or algorithms in the scheme and inexpensive public-key operation required in view of resource-starved sensor nodes minimize the storage,computation and communication overhead,and improve the efficiency of our scheme. In addition,the proposed scheme also supports source authentication without precluding in-network processing and passive participation.

关 键 词:系统设计  传感器  鉴别方法  计算机技术
文章编号:1005-9113(2007)06-0756-05
收稿时间:2005-07-09

An efficient authentication scheme based on one-way key chain for sensor network
LANG Wei-min,CHENG Wen-qing,YANG Zong-kai,.An efficient authentication scheme based on one-way key chain for sensor network[J].Journal of Harbin Institute of Technology,2007,14(6):756-760.
Authors:LANG Wei-min  CHENG Wen-qing  YANG Zong-kai  
Abstract:To strike a tradeoff between the security and the consumption of energy,computing and communication resources in the nodes,this paper presents an efficient authentication scheme based on one-way key chain for sensor network. The scheme can provide immediate authentication to fulfill the latency and the storage requirements and defends against various attacks such as replay,impersonation and denial of service. Meanwhile,our scheme possesses low overhead and scalability to large networks. Furthermore,the simple related protocols or algorithms in the scheme and inexpensive public-key operation required in view of resource-starved sensor nodes minimize the storage,computation and communication overhead,and improve the efficiency of our scheme. In addition,the proposed scheme also supports source authentication without precluding in-network processing and passive participation.
Keywords:system design  sensor network  authentication  key establishment  passive participation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号