A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network

被引:0
|
作者
Chang F. [1 ,2 ]
Cui J. [1 ,2 ]
Wang L. [1 ,3 ]
机构
[1] School of Computer Science and Technology, Anhui University, Hefei
[2] Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei
[3] School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 212013, Jiangsu
来源
Cui, Jie (cuijie@mail.ustc.edu.cn) | 2011年 / Science Press卷 / 54期
基金
中国国家自然科学基金;
关键词
Anonymous authentication; Public-key cryptosystem; Ring signature; Traceability; Wireless sensor network (WSN);
D O I
10.7544/issn1000-1239.2017.20160635
中图分类号
学科分类号
摘要
In wireless sensor network (WSN), sensor nodes are deployed in the corresponding application fields, in order to observe their environment and send their observations to the Sink. The message source should be protected in the process of transmission between nodes and Sink. On one hand, message authentication is one of the most effective ways to keep unauthorized and corrupted messages from being forwarded in wireless sensor network; on the other hand, anonymous communication can hide sensitive nodes identity information to implement the privacy protection of nodes location. However, anonymous communication has incurred a series of problems, such as, it gives the attacker an opportunity to use anonymous technology for illegal activities. Thus, it is particularly important to track the identity of the malicious nodes. In order to solve the problems above, a traceable and anonymous authentication scheme based on elliptic curve is proposed in this paper. The scheme combines elliptic curve with ring signature, implements nodes' anonymous communication and provides the intermediate nodes' authentication. The simulation results demonstrate that this scheme is equal to the existing schemes on the signature and certification cost. While, by using the linkable characteristics of ring signature, the proposed scheme can realize the traceability of malicious nodes, and improve the performance and security of the network. © 2017, Science Press. All right reserved.
引用
收藏
页码:2011 / 2020
页数:9
相关论文
共 28 条
  • [1] Akyildiz I.F., Su W., Sankarasubramaniam Y., Et al., A survey on sensor networks, IEEE Communications Magazine, 40, 8, pp. 102-114, (2002)
  • [2] Gottumukkala V.P.V., Pandit V., Li H., Et al., Base-station location anonymity and security technique (BLAST) for wireless sensor networks, Proc of IEEE Int Conf on Communications (ICC), pp. 6705-6709, (2012)
  • [3] Peng H., Chen H., Zhang X., Et al., Location privacy preservation in wireless sensor networks, Journal of Software, 26, 3, pp. 617-639, (2015)
  • [4] Li J., Li Y., Ren J., Et al., Hop-by-Hop message authentication and source privacy in wireless sensor networks, IEEE Trans on Parallel and Distributed Systems, 25, 5, pp. 1223-1232, (2014)
  • [5] Christin D., Pons-Sorolla D.R., Hollick M., Et al., TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications, Proc of the 9th Int Conf on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, (2014)
  • [6] Nezhad A.A., Miri A., Makrakis D., Location privacy and anonymity preserving routing for wireless sensor networks, Computer Networks, 52, 18, pp. 3433-3452, (2008)
  • [7] Chen J., Du X., Fang B., An efficient anonymous communication protocol for wireless sensor networks, Wireless Communications and Mobile Computing, 12, 14, pp. 1302-1312, (2012)
  • [8] Di Pietro R., Viejo A., Location privacy and resilience in wireless sensor networks querying, Computer Communications, 34, 3, pp. 515-523, (2011)
  • [9] Ye F., Luo H., Lu S., Et al., Statistical en-route filtering of injected false data in sensor networks, IEEE Journal on Selected Areas in Communications, 23, 4, pp. 839-850, (2005)
  • [10] Zhu S., Setia S., Jajodia S., Et al., An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, Proc of IEEE Symp on Security and Privacy, pp. 259-271, (2004)