《计算机应用研究》|Application Research of Computers

基于自验证公钥的安全高效WMNs密钥生成机制

Secure and efficient key generation scheme for WMNs using self-certified public key

免费全文下载 (已被下载 次)  
获取PDF全文
作者 张青
机构 天津财经大学 商学院,天津 300222
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)04-1149-05
DOI 10.3969/j.issn.1001-3695.2015.04.045
摘要 针对无线mesh网络现有的密钥生成机制中,无法实现双向认证、会话密钥协商以及过度消耗节点资源的问题,结合基于椭圆曲线的密码体制和基于自验证公钥的密钥生成方法,提出一种可用于无线mesh网络的密钥生成机制。这种机制避免了密钥托管,可实现通信双方身份认证和会话密钥协商,具有抵抗常见攻击的安全属性。实验及分析表明,相比同类协议,具有更低的计算和通信代价。
关键词 无线mesh网络;密钥协商;自验证公钥;双向认证
基金项目 陕西省科技厅自然科学基础研究计划项目(2010JM2016)
国家教育部人文社科青年基金资助项目(13YJC630195)
本文URL http://www.arocmag.com/article/01-2015-04-045.html
英文标题 Secure and efficient key generation scheme for WMNs using self-certified public key
作者英文名 ZHANG Qing
机构英文名 School of Business, Tianjin University of Finance & Economics, Tianjin 300222, China
英文摘要 In wireless mesh networks, the existing key generation schemes either failed to finish session key and authentication simultaneously or overspend nodes’ resources.Based on elliptic curve cryptosystems and self-certified public keys, this paper proposed a new key generation scheme, which could be used in wireless mesh networks.In the scheme, there was no need for key escrow, participants could achieve mutual authentication and session key agreement simultaneously, it also could resist common attacks.The experiment and analysis results indicate that it needs lower communication and computation cost compared with similar protocols.
英文关键词 wireless mesh networks; key agreement; self-certified public keys; mutual authentication
参考文献 查看稿件参考文献
  [1] AKYILDIZ F, WANG Xu-dong, WANG Wei-lin. Wireless mesh networks:a survey[J] . Computer Networks, 2005, 47(4):445-487.
[2] HU Zhi-yuan, DENG Jian-liang, CHANG Ying-hua, et al. Design and analysis of reliability wireless mesh network[C] //Proc of International Conference on Computer Science and Service System. 2011:3128-3131.
[3] ALRAYES M, TRIPATHI R, TYAGI N, et al. Enhancement of route maintenance in AODV over hybrid wireless mesh network[C] //Proc of the 1st International Conference on Recent Advances in Information Technology. 2012:276-278.
[4] LIU Shu-xin, PENG Jian-hua, LIU Cai-xia. Analysis of wireless mesh network security based on node function[C] //Proc of the 7th International Conference on Computational Intelligence and Security. 2011:648-652.
[5] KHAN S, ALRAJEH N A, LOO K K. Secure route selection in wireless mesh networks[J] . Computer Networks, 2012, 56(2):491-503.
[6] LI D, GE Z H. Energy efficient MAC protocol with power control and collision avoidance for wireless mesh network[J] . Journal of Computer Applications, 2013, 33(4):912-915.
[7] DONG Jing, CURTMOLAB R, NITA-ROTARU C. Secure network coding for wireless mesh networks:threats, challenges, and directions[J] . Computer Communications, 2009, 32(17):1790-1801.
[8] AI ISLAM A, RAGHUNATHAN V. End-to-end congestion control in wireless mesh networks using a neural network[C] //Proc of IEEE Wireless Communications and Networking Conference. 2011:677-682.
[9] VURAL S, WEI D L, MOESSNER K. Survey of experimental evaluation studies for wireless mesh network deployments in urban areas towards ubiquitous Internet[J] . IEEE Communications Surveys & Tutorials, 2013, 15(1):223-239.
[10] REDDY K, NALLA D. Identity based authenticated group key agreement protocol[C] //Progress in Cryptology. 2002:215-233.
[11] BRESSON E, CHEVASSUT O, POINTCHEVAL D. Provably-secure authenticated group Diffie-Hellman key exchange[J] . ACM Trans on Information and System Security, 2007, 10(3):1-44.
[12] TSENG Y M. A secure authenticated group key agreement protocol for resource-limited mobile devices[J] . Computer Journal, 2007, 50(1):41-52.
[13] 李海峰, 蓝才会, 左为平, 等. 独立网络中心的双方密钥协商协议[J] . 计算机应用, 2013, 33(5):1353-1356.
[14] DURAHIM A, SAVAS E. A-MAKE:an efficient, anonymous and accountable authentication framework for WMNs[C] //Proc of the 5th International Conference on Internet Monitoring and Protection. 2010:54-59.
[15] YOU Zi-yi, XIE Xiao-yao. A novel group key agreement protocol for wireless mesh network[J] . Computers and Electrical Engineering, 2011, 6(2):218-239.
[16] DURAHIM A, SAVAS E. A2-MAKE:an efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs[J] . Ad hoc Networks, 2011, 9(7):1202-1220.
[17] HAN Yi-liang, GUI Xiao-ling, WU Xu-guang, et al. Proxy encryption based secure multicast in wireless mesh networks[J] . Journal of Network and Computer Applications, 2011, 34(2):469-477.
[18] 邓飞, 贺军. 基于签名方案的多密钥协商协议[J] . 计算机应用, 2013, 32(12):3456-3457.
[19] WEI Qian, HE Jing-sha, ZHANG Xing. Key agreement with voting receiver in public safety mesh networks[C] //Proc of the 6th International Conference on Wireless and Mobile Communications. 2010:415-419.
[20] BUTTYAN L, DORA L, MARTINELLI F, et al. Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks[J] . Computer Communications, 2010, 33(8):907-922.
[21] GHARAVI H, HU B. Dynamic key refreshment for smart grid mesh network security[C] //Proc of IEEE Innovative Smart Grid Technologies Conference. 2013:1-6.
[22] 范盛超, 章国安, 费洪海, 等. 一种WLAN mesh网络漫游接入认证协议[J] . 电信科学, 2012, 28(2):104-109.
[23] LIN Hui, MA Jian-feng, HU Jia, et al. PA-SHWMP:a privacy-aware secure hybrid wireless mesh protocol for IEEE 802. 11s wireless mesh networks[J] . EURASIP Journal on Wireless Communications and Networking, 2012, 2012:69.
[24] JURISIC A, MENEZES A. ECC whitepapers:elliptic curve and cryptography[EB/OL] . [2008-03-23] . http://www. certicom/reasearch/weccrypt. html.
[25] HANKERSON D, MENEZES A, VANSTONE S. Guide to elliptic curve cryptography[M] . New York:Springer, 2004.
[26] KOBLITZ N. Elliptic curve cryptosystems[J] . Mathematical Computation, 1987, 48(177):203-209.
[27] SAEEDNIA S. A note on Girault’s self-certified model[J] . Information Processing Letters, 2003, 86:323-327.
[28] GIRAULT M. Self-certified public keys[C] //Proc of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques. 1991:491-497.
[29] LIAO Yi-ping, HSIAO Chih-ming. A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients[J] . Future Generation Computer Systems, 2013, 29(3):886-900.
[30] LAI Jun-zuo, KOU Wei-dong, CHEN Ke-fei. Self-generated-certificate public key encryption without pairing and its application[J] . Information Sciences, 2011, 181(11):2422-2435.
[31] DIFFIE W, HELLMAN M. New directions in cryptography[J] . IEEE Trans on Information Theory, 1976, 22(6):644-654.
[32] MIRACL[EB/OL] . https://certivox. org/display/EXT/MIRACL.
[33] SCHNEIER B. Applied cryptography[M] . 2nd ed. Boston:Wiley, 1996:333-346.
[34] FREY G, RUCK H. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves[J] . Mathematics of Computation, 1994, 62(206):865-874.
收稿日期 2014/3/26
修回日期 2014/5/19
页码 1149-1153
中图分类号 TP393.08
文献标志码 A