Font Size: a A A

Research On Authentication Technology Based On Elliptic Curve For Wireless Sensor Networks

Posted on:2018-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:F ChangFull Text:PDF
GTID:2348330515479954Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In wireless sensor networks,sensor nodes are deployed in the corresponding application fields to observe their environment and send their observations to the Sink.Due to the features of WSNs are resource-constrained,and deployed in unattended or even hostile environments.Adversaries can easily eavesdrop on the traffic,impersonate other nodes,inject bogus data or alter the contents of legitimate messages during the multi-hop forwarding,and reveal sensitive nodes identity information.Hence,message integrity and sensitive information of source should be protected in the process of transmission between nodes and Sink.On the one hand,message authentication is one of the most effective ways to keep unauthorized and corrupted messages from being forwarded in wireless sensor networks;On the other hand,anonymous communication can hide sensitive nodes identity information to implement the privacy protection of nodes' location.However,anonymous communication has incurred a series of problems.For example,it gives the attacker an opportunity to use anonymous technology for illegal activities.Thus,it is particularly important to track the identity of the malicious nodes.In order to solve the problems above,this article mainly studied from two aspects.Firstly,the research is to provide integrity and non-repudiation and privacy protection for messages.What's more,it not only considering the identity privacy of nodes,but also can track the identity of the malicious nodes.Secondly,in order to improve the efficiency of authentication,the research is to provide an efficient batch authentication.(1)In order to solve the problems about reveal sensitive nodes identity information and track the identity of the malicious nodes.A traceable and anonymous authentication scheme which based on elliptic curve was proposed in this paper.The scheme combines elliptic curve with ring signature,which implements nodes'anonymous communication and provides the intermediate nodes authentication.The scheme is attached some additional information in the ring signature,through the collaboration of all nodes in the ring to track the signer's identity.In some scenarios,intermediate nodes are unable to authenticate the message,only forwarding messages until finally accepted.Aimed at this drawback,the scheme ensures every forwarder on the routing path should be able to verify the authenticity and integrity of the messages upon reception.In addition,the scheme uses the linkable property of ring signature to track the identity of the malicious nodes.The simulation results demonstrate that this scheme is equal to the existing schemes on the signature and certification cost.While,by using the linkable characteristics of ring signature,the proposed scheme can realize the traceability of malicious nodes and improve the performance and security of the network.(2)The authenticity and integrity of the messages should be protected in the process of transmission,the authentication process also need to protect the privacy of nodes.In addition,in order to improve the efficiency of authentication,an efficient batch authentication scheme which based on elliptic curve was proposed in this paper.The basic idea is that some source nodes generate the signature on messages by exploiting the algorithm of elliptic curve.After cluster head and sink receive the signature from source nodes,they verify the signature using batch authentication.If verification is unsuccessful,then we must solve the problem by exploiting binary search algorithm for the signature from source nodes.In addition,our scheme can also provide source privacy,and it can also track the identity of the malicious nodes.Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the existing approach in terms of computational and communication overhead.The scheme guaranteed the integrity,authentication and non-repudiation of the messages.Moreover,it has advantages in time cost,storage cost,messages delivery rate and transmission delay.Compared with other schemes,this scheme has high security and good performance.
Keywords/Search Tags:Wireless sensor networks, Public-key cryptosystem, Anonymous authentication, Traceability, Ring signature, Batch authentication
PDF Full Text Request
Related items