WSNs中基于三因素節(jié)點(diǎn)評(píng)估的安全認(rèn)證方案
(3)存儲(chǔ)花費(fèi)
本文引用地址:http://m.butianyuan.cn/article/276364.htmWatro等提出的方案需要存儲(chǔ)公/私密鑰和系統(tǒng)參數(shù),Wong等和Das等提出的方案需要存儲(chǔ)系統(tǒng)參數(shù),而本文提出的方案需要存儲(chǔ)節(jié)點(diǎn)的信任度和系統(tǒng)參數(shù),所以它需要占用更多的存儲(chǔ)空間,圖1給出了四個(gè)方案的傳感器節(jié)點(diǎn)存儲(chǔ)需求的比較。然而,隨著傳感器技術(shù)的不斷提高,傳感器節(jié)點(diǎn)的運(yùn)算能力和存儲(chǔ)能力都會(huì)有較大提升。
(4)節(jié)點(diǎn)能量花費(fèi)
節(jié)點(diǎn)能量花費(fèi)包括計(jì)算花費(fèi)和通信花費(fèi)。在Watro等提出的方案中,節(jié)點(diǎn)需要進(jìn)行對(duì)用戶請(qǐng)求的回復(fù)、隨機(jī)數(shù)認(rèn)證、檢驗(yàn)和產(chǎn)生和確認(rèn)以及兩個(gè)公鑰的運(yùn)行。在Wong等提出的方案中,節(jié)點(diǎn)需要進(jìn)行表查詢、為產(chǎn)生參數(shù)而進(jìn)行的哈希函數(shù)運(yùn)算以及等待網(wǎng)關(guān)節(jié)點(diǎn)對(duì)用戶請(qǐng)求的回復(fù)。在Das等提出的方案中,節(jié)點(diǎn)需要進(jìn)行對(duì)用戶請(qǐng)求的回復(fù)、時(shí)間戳認(rèn)證以及為參數(shù)產(chǎn)生進(jìn)行哈希運(yùn)算。而在本文提出的方案中,節(jié)點(diǎn)會(huì)進(jìn)行信任度計(jì)算、對(duì)用戶請(qǐng)求的回復(fù)和時(shí)間戳認(rèn)證。此方案減少了哈希運(yùn)算的能量花費(fèi),而且通過(guò)信任度計(jì)算,大大提高認(rèn)證過(guò)程的安全性。
3.3 仿真實(shí)驗(yàn)
為了評(píng)估這四種用戶認(rèn)證方案的有效性,本文在NS2的仿真環(huán)境下驗(yàn)證它們?cè)谟袗阂夤?jié)點(diǎn)的環(huán)境下用戶成功認(rèn)證的概率。設(shè)置參數(shù)如下:用戶節(jié)點(diǎn)為15%,中繼服務(wù)器節(jié)點(diǎn)為5%,節(jié)點(diǎn)射頻通信距離為10,傳感器節(jié)點(diǎn)的最大、最小個(gè)數(shù)為100,網(wǎng)絡(luò)數(shù)目為400,執(zhí)行數(shù)為100。注意,85%的節(jié)點(diǎn)是與用戶認(rèn)證的傳感器節(jié)點(diǎn)。圖2給出了仿真結(jié)果。從圖中可以看出,相對(duì)于其他的三種用戶認(rèn)證方案,本文所提出的用戶認(rèn)證方案在有惡意節(jié)點(diǎn)的環(huán)境下仍保持了比較高的用戶成功認(rèn)證概率。
4 結(jié)語(yǔ)
無(wú)線傳感器網(wǎng)絡(luò)的認(rèn)證技術(shù)在安全方面還存在很多的不足,同時(shí)還面臨諸多的威脅。本文提出了一種無(wú)線傳感器網(wǎng)絡(luò)基于三因素節(jié)點(diǎn)評(píng)估的安全認(rèn)證方案,它引入了時(shí)間片、安全行動(dòng)系數(shù)和交互頻度的輕量級(jí)的節(jié)點(diǎn)信任度計(jì)算方法,并與經(jīng)過(guò)優(yōu)化的認(rèn)證方案相結(jié)合來(lái)進(jìn)行用戶認(rèn)證。安全性分析、性能分析和仿真實(shí)驗(yàn)的結(jié)果表明,該方案有效地提高了節(jié)點(diǎn)所提供信息的真實(shí)性和準(zhǔn)確性,并且與之前的許多認(rèn)證方案相比,它具有更高的安全性,很適合無(wú)線傳感器網(wǎng)絡(luò)。通過(guò)該方案,平衡了整個(gè)過(guò)程的能量消耗,從而更好地應(yīng)對(duì)針對(duì)無(wú)線傳感器網(wǎng)絡(luò)的安全攻擊。未來(lái)的工作是進(jìn)一步地完善該認(rèn)證方案的性能,使其能夠在無(wú)線傳感器網(wǎng)絡(luò)中得到廣泛地應(yīng)用。
參考文獻(xiàn):
[1]向亦宏, 朱燕民. 無(wú)線傳感器網(wǎng)絡(luò)中高效建立干擾模型的研究[J]. 計(jì)算機(jī)工程, 2014, 40(8): 1-5.
[2]Watro R, Kong D, Cuti S, et al. TinyPK: securing sensor networks with public key technology[C].Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. Washington,USA:ACM, 2004,59-64.
[3]Wong K H M, Zheng Yuan, Cao Jiannong, et al. A dynamic user authentication scheme for wireless sensor networks[C].Sensor Networks, Ubiquitous, and Trustworthy Computing.Taiwan: IEEE,2006,1-8.
[4]Das M L. Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 2009, 8(3): 1086-1090.
[5]Chen Tienho, Shih W K. A robust mutual authentication protocol for wireless sensor networks[J]. Etri Journal, 2010, 32(5): 704-712.
[6]Kumar P, Choudhury A J, Sain M, et al. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
[7]Qi Aiqin, Shen Yongjun. An authentication protocol based on Chinese remainder theorem in wireless sensor networks[C].Conference Anthology, IEEE. Lanzhou,China:IEEE, 2013,1-3.
[8]馬力,鄭國(guó)寧,孫朋.節(jié)點(diǎn)信任度模型的算法研究設(shè)計(jì)[J].計(jì)算機(jī)科學(xué),2012, 39(B06): 81-85.
[9]Gu Chengjie, Zhang Shunyi, Feng Huibin, et al. A novel trust management model for P2P network with reputation and risk evaluation[C].E-Business and E-Government (ICEE).Nanjing,China:IEEE,2010,3544-3547.
[10]Wu Guowei, Du Zhuang, Hu Yibo, et al. A dynamic trust model exploiting the time slice in WSNs[J]. Soft Computing, 2014, 18(9): 1829-1840.
[11]Messerges T S, Dabbish E A, Sloan R H. Examining smart-card security under the threat of power analysis attacks[J]. Computers, IEEE Transactions on, 2002, 51(5): 541-552.
[12]Shah M D, Gala S N, Shekokar N M. Lightweight authentication protocol used in Wireless Sensor Network[C].Circuits, Systems, Communication and Information Technology Applications (CSCITA).Mumbai,India:IEEE,,2014:,138-143.
[13]Delgado-Mohatar O, Fúster-Sabater A, Sierra J M. A light-weight authentication scheme for wireless sensor networks[J].Ad Hoc Networks, 2011, 9(5): 727-735.
[14]Yu Yanli, Li Keqiu, Zhou Wanlei, et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures[J]. Journal of Network and Computer Applications,2012,35(3): 867-880.
[15]Lee C C, Hsu C W. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps[J]. Nonlinear Dynamics, 2013, 71(1-2): 201-211.
評(píng)論