计算机工程与设计
計算機工程與設計
계산궤공정여설계
COMPUTER ENGINEERING AND DESIGN
2014年
12期
4165-4169,4180
,共6页
张启坤%甘勇%王锐芳%李元章
張啟坤%甘勇%王銳芳%李元章
장계곤%감용%왕예방%리원장
无线传感器网络%群组密钥交换%可认证性%双线性映射%双线性计算Diffie-Hellman问题
無線傳感器網絡%群組密鑰交換%可認證性%雙線性映射%雙線性計算Diffie-Hellman問題
무선전감기망락%군조밀약교환%가인증성%쌍선성영사%쌍선성계산Diffie-Hellman문제
wireless sensor networks%group key agreement protocol%authentication%bilinear mapping%BCDHP
无线传感器网络中节点电池电量有限、节点计算能力及存储能力受限,使得现有的大部分群组密钥交换技术不适用于无线传感器网络。针对该问题,提出一种动态的可认证群组密钥交换协议。采用双线性映射技术实现无线传感器网络中节点之间的群组密钥交换。该协议具有可认证性,避免群组密钥交换过程中遭到欺骗攻击及中间人攻击;具有动态性,适用于无线传感器网络节点动态部署;在双线性计算Diffie‐Hellman (bilinear computation Diffie‐Hellman ,BCDH)困难性假设下是可证安全的。分析结果表明,该协议具有较高的安全性和较好的性能。
無線傳感器網絡中節點電池電量有限、節點計算能力及存儲能力受限,使得現有的大部分群組密鑰交換技術不適用于無線傳感器網絡。針對該問題,提齣一種動態的可認證群組密鑰交換協議。採用雙線性映射技術實現無線傳感器網絡中節點之間的群組密鑰交換。該協議具有可認證性,避免群組密鑰交換過程中遭到欺騙攻擊及中間人攻擊;具有動態性,適用于無線傳感器網絡節點動態部署;在雙線性計算Diffie‐Hellman (bilinear computation Diffie‐Hellman ,BCDH)睏難性假設下是可證安全的。分析結果錶明,該協議具有較高的安全性和較好的性能。
무선전감기망락중절점전지전량유한、절점계산능력급존저능력수한,사득현유적대부분군조밀약교환기술불괄용우무선전감기망락。침대해문제,제출일충동태적가인증군조밀약교환협의。채용쌍선성영사기술실현무선전감기망락중절점지간적군조밀약교환。해협의구유가인증성,피면군조밀약교환과정중조도기편공격급중간인공격;구유동태성,괄용우무선전감기망락절점동태부서;재쌍선성계산Diffie‐Hellman (bilinear computation Diffie‐Hellman ,BCDH)곤난성가설하시가증안전적。분석결과표명,해협의구유교고적안전성화교호적성능。
Wireless sensor networks have such obvious characteristics as energy‐constraint and dynamic topology ,computing power and storage capacity are limited. For the problem that most of the existing group key agreement technique can not be used in wireless sensor networks ,a dynamic authenticated group key agreement protocol was proposed. Multi‐linear mapping techno‐logy was used to achieve group key agreement among cluster head nodes and bilinear mapping technology was used to achieve group key agreement among ordinary nodes in wireless sensor networks. The protocol is authentic ,so that it can defense the spoofing attacks and man‐in‐the‐middle attacks. Also the protocol is dynamic ,so that it can adapt to the replacement of sensor nodes in wireless sensor network. Under the difficulty assumption of BCDH ,the proposed protocol is secure. Extensive security and performance analysis shows that the proposed scheme has the advantages in security ,computation consumption and commu‐nication consumption.