Suppr超能文献

无线传感器网络中高效且匿名的双因素用户认证:通过轻量级传感器计算实现用户匿名性

Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

作者信息

Nam Junghyun, Choo Kim-Kwang Raymond, Han Sangchul, Kim Moonseong, Paik Juryon, Won Dongho

机构信息

Department of Computer Engineering, Konkuk University, Chungju, Chungcheongbukdo, Korea.

School of Information Technology and Mathematical Sciences, University of South Australia, Mawson Lakes, South Australia, Australia.

出版信息

PLoS One. 2015 Apr 7;10(4):e0116709. doi: 10.1371/journal.pone.0116709. eCollection 2015.

Abstract

A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

摘要

一种用于无线传感器网络的基于智能卡的用户认证方案(以下简称SCA-WSN方案)旨在确保只有同时拥有智能卡和相应密码的用户才能访问传感器数据及其传输。尽管近年来进行了许多研究工作,但设计一种实现用户匿名性的高效SCA-WSN方案仍然是一项具有挑战性的任务。大多数已发表的SCA-WSN方案为了提高效率仅使用轻量级加密技术(而非公钥加密技术),并且已被证明无法提供用户匿名性。一些方案采用椭圆曲线密码学以提高安全性,但要求资源严格受限的传感器执行计算成本高昂的标量点乘法;尽管计算需求增加,但这些方案仍无法提供用户匿名性。在本文中,我们提出了一种新的SCA-WSN方案,该方案不仅实现了用户匿名性,而且在传感器的计算负载方面也很高效。我们的方案采用椭圆曲线密码学,但仅将其用于匿名的用户到网关认证,从而允许传感器仅执行轻量级加密操作。我们的方案在从广泛接受的Bellare-Pointcheval-Rogaway(2000)模型扩展而来的形式化模型中也具有可证明的安全性,以捕获用户匿名性属性和各种SCA-WSN特定攻击(例如,智能卡被盗攻击、节点捕获攻击、特权内部人员攻击和验证器被盗攻击)。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/11e5/4389980/d2f3e18b33aa/pone.0116709.g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验