基于橢圓曲線的無(wú)線傳感網(wǎng)認(rèn)證技術(shù)研究
發(fā)布時(shí)間:2018-01-19 00:02
本文關(guān)鍵詞: 無(wú)線傳感網(wǎng) 公鑰密碼體制 匿名認(rèn)證 可追蹤 環(huán)簽名 批認(rèn)證 出處:《安徽大學(xué)》2017年碩士論文 論文類(lèi)型:學(xué)位論文
【摘要】:在無(wú)線傳感網(wǎng)中,傳感器節(jié)點(diǎn)布置在相應(yīng)的應(yīng)用領(lǐng)域,用于檢測(cè)周邊環(huán)境并發(fā)送檢測(cè)值給Sink。由于傳感器節(jié)點(diǎn)資源受限、部署環(huán)境惡劣而且采用無(wú)線多跳通信方式等特點(diǎn),易受到攻擊者攻擊,引發(fā)嚴(yán)重的敏感信息和節(jié)點(diǎn)身份隱私泄露等問(wèn)題。因此,消息在轉(zhuǎn)發(fā)的過(guò)程中,消息的完整性及消息源的敏感信息應(yīng)該受到保護(hù)。一方面,消息認(rèn)證是阻止未經(jīng)授權(quán)和損壞的消息轉(zhuǎn)發(fā)的最有效的方法;另一方面,采用匿名通信的方式可以隱藏敏感節(jié)點(diǎn)的身份信息,實(shí)現(xiàn)節(jié)點(diǎn)的位置隱私保護(hù)。然而,匿名通信也給攻擊者提供了利用匿名技術(shù)進(jìn)行違法活動(dòng)的機(jī)會(huì)。因此,追蹤惡意節(jié)點(diǎn)的身份就顯得尤為重要。針對(duì)以上無(wú)線傳感網(wǎng)中存在的安全問(wèn)題,本文主要從兩個(gè)方面進(jìn)行研究:一是對(duì)無(wú)線傳感網(wǎng)中傳輸?shù)南⑻峁┩暾浴⒉豢傻仲囆院捅C苄员Wo(hù),并且在對(duì)節(jié)點(diǎn)的身份信息進(jìn)行隱私保護(hù)的同時(shí),進(jìn)行可追蹤惡意節(jié)點(diǎn)身份的研究;另一個(gè)是為了提高認(rèn)證效率進(jìn)行的無(wú)線傳感網(wǎng)中基于橢圓曲線的高效批認(rèn)證的研究。(1)為了解決無(wú)線傳感網(wǎng)絡(luò)中的發(fā)送節(jié)點(diǎn)身份隱私泄露和惡意節(jié)點(diǎn)追蹤問(wèn)題。提出了一種基于橢圓曲線的可追蹤匿名認(rèn)證方案,方案采用基于橢圓曲線密碼機(jī)制的可鏈接環(huán)簽名實(shí)現(xiàn)節(jié)點(diǎn)匿名通信,同時(shí)將一些額外的信息附加到環(huán)簽名中,使其必要時(shí)可通過(guò)環(huán)中所有節(jié)點(diǎn)的協(xié)作追蹤簽名者的真實(shí)身份,用以解決無(wú)線傳感網(wǎng)中的發(fā)送節(jié)點(diǎn)身份隱私泄露和惡意節(jié)點(diǎn)追蹤問(wèn)題。針對(duì)現(xiàn)有的一些方案存在的中間節(jié)點(diǎn)不能進(jìn)行消息認(rèn)證,只能轉(zhuǎn)發(fā)消息直到消息最終被接收節(jié)點(diǎn)認(rèn)證的不足,方案采用逐跳認(rèn)證實(shí)現(xiàn)中間節(jié)點(diǎn)認(rèn)證,并且利用環(huán)簽名的可鏈接特性,實(shí)現(xiàn)對(duì)惡意節(jié)點(diǎn)的可追蹤性。經(jīng)過(guò)理論分析,提出的基于橢圓曲線的可追蹤匿名認(rèn)證方案可實(shí)現(xiàn)節(jié)點(diǎn)匿名通信,提供中間節(jié)點(diǎn)的認(rèn)證。而且與對(duì)比方案比較顯示,在簽名產(chǎn)生和認(rèn)證開(kāi)銷(xiāo)相當(dāng)?shù)那闆r下,利用環(huán)簽名的可鏈接特性實(shí)現(xiàn)對(duì)惡意節(jié)點(diǎn)的可追蹤性,從而提高了性能和網(wǎng)絡(luò)的安全性。(2)為了提高認(rèn)證效率及保護(hù)節(jié)點(diǎn)和感知對(duì)象的隱私,提出了無(wú)線傳感網(wǎng)中基于橢圓曲線的高效批認(rèn)證方案。方案采用橢圓曲線技術(shù)進(jìn)行簽名,無(wú)需使用雙線性對(duì)的前提下實(shí)現(xiàn)批認(rèn)證,若批認(rèn)證未通過(guò),可采用二分搜索技術(shù)對(duì)消息進(jìn)行遞歸認(rèn)證,消息的傳輸過(guò)程中不會(huì)暴露節(jié)點(diǎn)的身份信息,而且可以對(duì)可疑節(jié)點(diǎn)進(jìn)行身份追蹤。通過(guò)理論分析和仿真結(jié)果表明,該方案保證消息的可認(rèn)證性、完整性和不可否認(rèn)性,并且在時(shí)間開(kāi)銷(xiāo)、存儲(chǔ)開(kāi)銷(xiāo)、消息的交付率以及消息傳輸時(shí)延等方面都具有優(yōu)勢(shì)。而且與其他方案相比,具有較高的安全性和較好的性能。
[Abstract]:In wireless sensor network, sensor nodes are arranged in the corresponding application field, which is used to detect the surrounding environment and send the detection value to Sink. because of the resource limitation of sensor nodes. The deployment environment is bad and wireless multi-hop communication is used, which is vulnerable to attack by attackers, causing serious problems such as sensitive information and node identity privacy disclosure, etc. Therefore, the message is transmitted in the process of transmission. The integrity of the message and the sensitive information of the message source should be protected. On the one hand, message authentication is the most effective way to prevent unauthorized and corrupted message forwarding. On the other hand, anonymous communication can hide the identity information of sensitive nodes and protect the location privacy of nodes. Anonymous communication also provides an opportunity for attackers to use anonymous technology to carry out illegal activities. Therefore, tracking the identity of malicious nodes is particularly important. This paper mainly studies from two aspects: the first is to provide integrity, non-repudiation and confidentiality protection for the message transmitted in the wireless sensor network, and at the same time to protect the privacy of the identity information of the node. Research on the identity of traceable malicious nodes; The other is the research of efficient batch authentication based on elliptic curve in wireless sensor networks to improve authentication efficiency. A traceable anonymous authentication scheme based on elliptic curve is proposed to solve the problem of identity privacy disclosure and malicious node tracking in wireless sensor networks. In the scheme, the linked ring signature based on elliptic curve cryptosystem is used to realize the anonymous communication of nodes, and some additional information is attached to the ring signature at the same time. Make it possible to trace the true identity of the signer through the collaboration of all nodes in the ring if necessary. It is used to solve the problem of identity privacy disclosure and malicious node tracing in wireless sensor network. Only the message can be forwarded until the message is finally authenticated by the receiving node. The scheme adopts hop authentication to realize the authentication of the intermediate node and utilizes the link property of ring signature. The traceability of malicious nodes is realized. Through theoretical analysis, the traceable anonymous authentication scheme based on elliptic curve can realize anonymous communication. The authentication of intermediate nodes is provided, and compared with the comparison scheme, it shows that when the signature generation and authentication cost are the same, the link property of ring signature can be used to realize the traceability of malicious nodes. In order to improve the authentication efficiency and protect the privacy of nodes and perceived objects, the performance and network security are improved. This paper presents an efficient batch authentication scheme based on elliptic curve in wireless sensor network. The scheme uses elliptic curve technology to sign and realize batch authentication without using bilinear pairs. The binary search technique can be used to authenticate the message recursively. The identity information of the node can not be exposed during the transmission of the message, and the identity of the suspicious node can be tracked. The theoretical analysis and simulation results show that. This scheme ensures the authentication, integrity and non-repudiation of messages, and has advantages in time overhead, storage overhead, message delivery rate and message transmission delay, and compared with other schemes. It has higher security and better performance.
【學(xué)位授予單位】:安徽大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TP309;TP212.9;TN929.5
【參考文獻(xiàn)】
相關(guān)期刊論文 前5條
1 彭輝;陳紅;張曉瑩;范永健;李翠平;李德英;;無(wú)線傳感器網(wǎng)絡(luò)位置隱私保護(hù)技術(shù)[J];軟件學(xué)報(bào);2015年03期
2 杜紅珍;黃梅娟;溫巧燕;;高效的可證明安全的無(wú)證書(shū)聚合簽名方案[J];電子學(xué)報(bào);2013年01期
3 劉志雄;王建新;張士庚;;A neighbor information based false data filtering scheme in wireless sensor networks[J];Journal of Central South University;2012年11期
4 王化群;徐名海;郭顯久;;幾種無(wú)證書(shū)數(shù)字簽名方案的安全性分析及改進(jìn)[J];通信學(xué)報(bào);2008年05期
5 馮登國(guó);可證明安全性理論與方法研究[J];軟件學(xué)報(bào);2005年10期
,本文編號(hào):1441721
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/1441721.html
最近更新
教材專(zhuān)著