天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 信息工程論文 >

基于橢圓曲線的無(wú)線傳感網(wǎng)認(rèn)證技術(shù)研究

發(fā)布時(shí)間:2018-01-19 00:02

  本文關(guān)鍵詞: 無(wú)線傳感網(wǎng) 公鑰密碼體制 匿名認(rèn)證 可追蹤 環(huán)簽名 批認(rèn)證 出處:《安徽大學(xué)》2017年碩士論文 論文類(lèi)型:學(xué)位論文


【摘要】:在無(wú)線傳感網(wǎng)中,傳感器節(jié)點(diǎn)布置在相應(yīng)的應(yīng)用領(lǐng)域,用于檢測(cè)周邊環(huán)境并發(fā)送檢測(cè)值給Sink。由于傳感器節(jié)點(diǎn)資源受限、部署環(huán)境惡劣而且采用無(wú)線多跳通信方式等特點(diǎn),易受到攻擊者攻擊,引發(fā)嚴(yán)重的敏感信息和節(jié)點(diǎn)身份隱私泄露等問(wèn)題。因此,消息在轉(zhuǎn)發(fā)的過(guò)程中,消息的完整性及消息源的敏感信息應(yīng)該受到保護(hù)。一方面,消息認(rèn)證是阻止未經(jīng)授權(quán)和損壞的消息轉(zhuǎn)發(fā)的最有效的方法;另一方面,采用匿名通信的方式可以隱藏敏感節(jié)點(diǎn)的身份信息,實(shí)現(xiàn)節(jié)點(diǎn)的位置隱私保護(hù)。然而,匿名通信也給攻擊者提供了利用匿名技術(shù)進(jìn)行違法活動(dòng)的機(jī)會(huì)。因此,追蹤惡意節(jié)點(diǎn)的身份就顯得尤為重要。針對(duì)以上無(wú)線傳感網(wǎng)中存在的安全問(wèn)題,本文主要從兩個(gè)方面進(jìn)行研究:一是對(duì)無(wú)線傳感網(wǎng)中傳輸?shù)南⑻峁┩暾浴⒉豢傻仲囆院捅C苄员Wo(hù),并且在對(duì)節(jié)點(diǎn)的身份信息進(jìn)行隱私保護(hù)的同時(shí),進(jìn)行可追蹤惡意節(jié)點(diǎn)身份的研究;另一個(gè)是為了提高認(rèn)證效率進(jìn)行的無(wú)線傳感網(wǎng)中基于橢圓曲線的高效批認(rèn)證的研究。(1)為了解決無(wú)線傳感網(wǎng)絡(luò)中的發(fā)送節(jié)點(diǎn)身份隱私泄露和惡意節(jié)點(diǎn)追蹤問(wèn)題。提出了一種基于橢圓曲線的可追蹤匿名認(rèn)證方案,方案采用基于橢圓曲線密碼機(jī)制的可鏈接環(huán)簽名實(shí)現(xiàn)節(jié)點(diǎn)匿名通信,同時(shí)將一些額外的信息附加到環(huán)簽名中,使其必要時(shí)可通過(guò)環(huán)中所有節(jié)點(diǎn)的協(xié)作追蹤簽名者的真實(shí)身份,用以解決無(wú)線傳感網(wǎng)中的發(fā)送節(jié)點(diǎn)身份隱私泄露和惡意節(jié)點(diǎn)追蹤問(wèn)題。針對(duì)現(xiàn)有的一些方案存在的中間節(jié)點(diǎn)不能進(jìn)行消息認(rèn)證,只能轉(zhuǎn)發(fā)消息直到消息最終被接收節(jié)點(diǎn)認(rèn)證的不足,方案采用逐跳認(rèn)證實(shí)現(xiàn)中間節(jié)點(diǎn)認(rèn)證,并且利用環(huán)簽名的可鏈接特性,實(shí)現(xiàn)對(duì)惡意節(jié)點(diǎn)的可追蹤性。經(jīng)過(guò)理論分析,提出的基于橢圓曲線的可追蹤匿名認(rèn)證方案可實(shí)現(xiàn)節(jié)點(diǎn)匿名通信,提供中間節(jié)點(diǎn)的認(rèn)證。而且與對(duì)比方案比較顯示,在簽名產(chǎn)生和認(rèn)證開(kāi)銷(xiāo)相當(dāng)?shù)那闆r下,利用環(huán)簽名的可鏈接特性實(shí)現(xiàn)對(duì)惡意節(jié)點(diǎn)的可追蹤性,從而提高了性能和網(wǎng)絡(luò)的安全性。(2)為了提高認(rèn)證效率及保護(hù)節(jié)點(diǎn)和感知對(duì)象的隱私,提出了無(wú)線傳感網(wǎng)中基于橢圓曲線的高效批認(rèn)證方案。方案采用橢圓曲線技術(shù)進(jìn)行簽名,無(wú)需使用雙線性對(duì)的前提下實(shí)現(xiàn)批認(rèn)證,若批認(rèn)證未通過(guò),可采用二分搜索技術(shù)對(duì)消息進(jìn)行遞歸認(rèn)證,消息的傳輸過(guò)程中不會(huì)暴露節(jié)點(diǎn)的身份信息,而且可以對(duì)可疑節(jié)點(diǎn)進(jìn)行身份追蹤。通過(guò)理論分析和仿真結(jié)果表明,該方案保證消息的可認(rèn)證性、完整性和不可否認(rèn)性,并且在時(shí)間開(kāi)銷(xiāo)、存儲(chǔ)開(kāi)銷(xiāo)、消息的交付率以及消息傳輸時(shí)延等方面都具有優(yōu)勢(shì)。而且與其他方案相比,具有較高的安全性和較好的性能。
[Abstract]:In wireless sensor network, sensor nodes are arranged in the corresponding application field, which is used to detect the surrounding environment and send the detection value to Sink. because of the resource limitation of sensor nodes. The deployment environment is bad and wireless multi-hop communication is used, which is vulnerable to attack by attackers, causing serious problems such as sensitive information and node identity privacy disclosure, etc. Therefore, the message is transmitted in the process of transmission. The integrity of the message and the sensitive information of the message source should be protected. On the one hand, message authentication is the most effective way to prevent unauthorized and corrupted message forwarding. On the other hand, anonymous communication can hide the identity information of sensitive nodes and protect the location privacy of nodes. Anonymous communication also provides an opportunity for attackers to use anonymous technology to carry out illegal activities. Therefore, tracking the identity of malicious nodes is particularly important. This paper mainly studies from two aspects: the first is to provide integrity, non-repudiation and confidentiality protection for the message transmitted in the wireless sensor network, and at the same time to protect the privacy of the identity information of the node. Research on the identity of traceable malicious nodes; The other is the research of efficient batch authentication based on elliptic curve in wireless sensor networks to improve authentication efficiency. A traceable anonymous authentication scheme based on elliptic curve is proposed to solve the problem of identity privacy disclosure and malicious node tracking in wireless sensor networks. In the scheme, the linked ring signature based on elliptic curve cryptosystem is used to realize the anonymous communication of nodes, and some additional information is attached to the ring signature at the same time. Make it possible to trace the true identity of the signer through the collaboration of all nodes in the ring if necessary. It is used to solve the problem of identity privacy disclosure and malicious node tracing in wireless sensor network. Only the message can be forwarded until the message is finally authenticated by the receiving node. The scheme adopts hop authentication to realize the authentication of the intermediate node and utilizes the link property of ring signature. The traceability of malicious nodes is realized. Through theoretical analysis, the traceable anonymous authentication scheme based on elliptic curve can realize anonymous communication. The authentication of intermediate nodes is provided, and compared with the comparison scheme, it shows that when the signature generation and authentication cost are the same, the link property of ring signature can be used to realize the traceability of malicious nodes. In order to improve the authentication efficiency and protect the privacy of nodes and perceived objects, the performance and network security are improved. This paper presents an efficient batch authentication scheme based on elliptic curve in wireless sensor network. The scheme uses elliptic curve technology to sign and realize batch authentication without using bilinear pairs. The binary search technique can be used to authenticate the message recursively. The identity information of the node can not be exposed during the transmission of the message, and the identity of the suspicious node can be tracked. The theoretical analysis and simulation results show that. This scheme ensures the authentication, integrity and non-repudiation of messages, and has advantages in time overhead, storage overhead, message delivery rate and message transmission delay, and compared with other schemes. It has higher security and better performance.
【學(xué)位授予單位】:安徽大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TP309;TP212.9;TN929.5

【參考文獻(xiàn)】

相關(guān)期刊論文 前5條

1 彭輝;陳紅;張曉瑩;范永健;李翠平;李德英;;無(wú)線傳感器網(wǎng)絡(luò)位置隱私保護(hù)技術(shù)[J];軟件學(xué)報(bào);2015年03期

2 杜紅珍;黃梅娟;溫巧燕;;高效的可證明安全的無(wú)證書(shū)聚合簽名方案[J];電子學(xué)報(bào);2013年01期

3 劉志雄;王建新;張士庚;;A neighbor information based false data filtering scheme in wireless sensor networks[J];Journal of Central South University;2012年11期

4 王化群;徐名海;郭顯久;;幾種無(wú)證書(shū)數(shù)字簽名方案的安全性分析及改進(jìn)[J];通信學(xué)報(bào);2008年05期

5 馮登國(guó);可證明安全性理論與方法研究[J];軟件學(xué)報(bào);2005年10期



本文編號(hào):1441721

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/1441721.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶d57e1***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
激情内射亚洲一区二区三区| 日本高清不卡一二三区| 亚洲一区二区三区福利视频| 人人妻人人澡人人夜夜| 精品少妇一区二区视频| 激情综合网俺也狠狠地| 99一级特黄色性生活片| 好吊日在线视频免费观看| 少妇人妻精品一区二区三区| 亚洲一区二区三区av高清| 亚洲男人天堂网在线视频| 国产一区二区三中文字幕| 九九热九九热九九热九九热| 国产一区二区三区口爆在线| 日本福利写真在线观看| 激情丁香激情五月婷婷| 欧美一区二区三区喷汁尤物| 国产精品久久男人的天堂| 亚洲综合一区二区三区在线| 风间中文字幕亚洲一区| 国产伦精品一一区二区三区高清版| 免费观看成人免费视频| 国产精品午夜一区二区三区 | 五月综合激情婷婷丁香| 亚洲男人的天堂色偷偷| 国产精品久久香蕉国产线| 国产精品日本女优在线观看| 一区二区三区日韩在线| 夫妻性生活一级黄色录像| 隔壁的日本人妻中文字幕版| 亚洲精品中文字幕一二三| 一区二区三区在线不卡免费| 日韩一区二区免费在线观看| 大伊香蕉一区二区三区| 日韩欧美在线看一卡一卡| 激情三级在线观看视频| 欧美午夜一级艳片免费看| 黄色日韩欧美在线观看| 99久久精品视频一区二区| 中文字幕一二区在线观看| 精品久久少妇激情视频|