北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2013, Vol. 36 ›› Issue (1): 110-114.doi: 10.13190/jbupt.201301.110.huanghp

• 研究报告 • 上一篇    

采用投票机制的移动传感节点广播认证方案

黄海平1,2,3,谭志刚2,3,王汝传2,3,4,秦小麟1,陈九天2   

  1. 1. 南京航空航天大学 计算机科学与技术学院, 南京 210016;<br>2. 南京邮电大学 计算机学院, 南京 210003;<br>3. 江苏省无线传感网高技术研究重点实验室, 南京 210003;<br>4. 宽带无线通信与传感网技术教育部重点实验室, 南京 210003
  • 收稿日期:2012-07-18 修回日期:2012-09-14 出版日期:2013-02-28 发布日期:2013-01-19
  • 通讯作者: 黄海平 E-mail:hai313145@sina.com
  • 作者简介:黄海平(1981-),男,副教授,E-mail:hhp@njupt.deu.cn
  • 基金资助:

    国家自然科学基金项目(61003039,61170065);江苏省属高校自然科学研究重大项目(12KJA520002);国家博士后基金项目(2012M511753);江苏省博士后基金项目(1101011B)

Broadcasting Authentication Scheme of Wireless Mobile Sensor Network Using Voting Mechanism

HUANG Hai-ping1,2,3, TAN Zhi-gang2,3, WANG Ru-chuan2,3,4, QIN Xiao-lin2, CHEN Jiu-tian2   

  1. 1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China;<br>2. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China;<br>3. Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China;<br>4. Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2012-07-18 Revised:2012-09-14 Online:2013-02-28 Published:2013-01-19
  • Contact: Hai-Ping HUANG E-mail:hai313145@sina.com

摘要:

提出了一种采用投票机制的移动传感器节点的广播认证方案.首先待认证节点通信范围内的其他节点对其广播的身份信息进行验证,验证通过后再广播投票信息,当赞成票数达到阈值<em>T</em><sub>1</sub>后,其他节点通过对该节点的认证,并接受其入网请求.当节点移动时,充分利用节点入网时已经进行过的验证结果,对待验证节点进行认证投票,赞成票数达到阈值<em>T</em><sub>2</sub>,待验证节点通过验证.仿真结果显示,在保证节点认证过程中安全性的前提下,本方案较其他3个对比方案需要更少的通信数据量,可更好地减少节点广播认证消耗的能量,同时在存储消耗方面具有良好的低能耗性.

关键词: 无线传感器网络, 广播认证, 投票机制

Abstract:

A voting mechanism based broadcast authentication scheme for the mobile sensor networks is presented. The identity of the broadcast is verified and voted by nodes within the communication range to be authenticated. If the number of pros surpasses threshold <em>T<sub><</sub>/em>1, the node passes the authentication and joins the network. When the node moves, the mentioned above is used to assist authenticating. If the number of pros surpasses threshold <em>T<sub><</sub>/em>2, the node passes the authentication. Simulation shows that as long as security is assured during the authentication process, the proposed program requires less communication traffic thus consumes less energy than the three compared methods, the proposed method performs well on storage consumption with low-consumption.

Key words: wireless sensor networks, broadcasting authentication, voting mechanism

中图分类号: