Analysis on security of EMSR protocol in wireless sensor network

被引:0
作者
Han, Jian-Hua [1 ]
Wu, Liu-Fei [2 ]
机构
[1] School of Computer, Guangdong University of Technology
[2] School of Telecommunications Engineering, Xidian University
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2009年 / 38卷 / 03期
关键词
Authentication; Canetti-Krawczyk security model; Key establishment; Wireless sensor network;
D O I
10.3969/j.issn.1001-0548.2009.03.020
中图分类号
学科分类号
摘要
According to the security problem existing in current key management scheme of wireless sensor network, an authenticated key establishing scheme (EMSR) which is used in wireless sensor network and can be proved to be safe is put forward. By applying public key certificate, the mutual authentication is realized. At the same time, the authentication problem caused by the absolute use of symmetric encryption mechanism can be efficiently avoided. In CK security model, security proof for EMSR protocol has been carried out and the performance of key establishing scheme based on several kinds of public key mechanism has been analyzed. The results of security proof and performance analysis show that the EMSR has the advantages on the responding security properties in security model and supporting the net node whose resources are limited, and satisfies the communication requirements of wireless sense net.
引用
收藏
页码:401 / 405
页数:4
相关论文
共 13 条
  • [1] Hubaux J.P., Buttyan L., Capkun S., The quest for security in mobile Ad hoc networks, ACM Symposium on Mobile Ad hoc Networking and Computing, pp. 146-155, (2001)
  • [2] Shoup V., Practical threshold signatures, Proc of Advances in Cryptology, Eurocrypt'00, pp. 207-220, (2000)
  • [3] Perrig A., Szewczyk R., Wen V., Et al., SPINS: Security protocols for sensor networks, Mobile Computing and Networking, pp. 189-199, (2001)
  • [4] Cheng B., Sungha D., Reduce radio energy consumption of key management protocol for wireless sensor networks, ISLPED'04, (2004)
  • [5] Ronald W., Derrick K., Sue-Fen C., Et al., TinyPK: Securing sensor networks with public key technology, Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 59-64, (2004)
  • [6] Huang Q., Cukier J., Kobayashi H., Et al., Fast authenticated key establishment protocols for self-organizing sensor networks, Proceedings of 2nd ACM Workshop on Wireless Sensor Networks and Applications, pp. 141-150, (2003)
  • [7] Du W.-L., Wang R.-H., Ning P., An efficient scheme for authenticating public keys in sensor networks, MobiHoc'05, pp. 58-67, (2005)
  • [8] Johann G., Alexander S., Stefan T., The Energy cost of cryptographic key establishment in wireless sensor networks (extended abstract), ASIACCS'07, pp. 380-382, (2007)
  • [9] Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, (2002)
  • [10] Alan P., Kristie K., Samir C., A secure key management scheme for sensor networks, Proceeding of the 10th Americas Conference on Information System, pp. 1739-1745, (2004)