首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于生物特征标识的无线传感器网络三因素用户认证协议
引用本文:房卫东,张武雄,杨旸,张传雷,陈伟.基于生物特征标识的无线传感器网络三因素用户认证协议[J].电子学报,2018,46(3):702-713.
作者姓名:房卫东  张武雄  杨旸  张传雷  陈伟
作者单位:1. 中国科学院上海微系统与信息技术研究所无线传感网与通信重点实验室, 上海 200051; 2. 上海无线通信研究中心, 上海 201210; 3. 天津科技大学计算机科学与信息工程学院, 天津 300222; 4. 中国矿业大学计算机科学与技术学院, 江苏徐州 221116
摘    要:为满足高安全级别场景(如军事、国家安全、银行等)的应用需求,进一步提高无线传感器网络用户认证协议的安全性,提出了基于生物特征识别的三因素用户认证协议.针对Althobaiti协议无法防御节点妥协攻击、模拟攻击、中间人攻击和内部特权攻击的安全缺陷,增加智能卡和密码作为协议基本安全因素,并利用生物特征标识信息生成函数与回复函数处理的生物特征标识作为附加安全因素;在密钥管理中,为每个节点配置了与网关节点共享唯一密钥,保证认证过程的独立性与安全性;实现用户自主选择与网关节点的共享密钥,提高公共信道通信的安全性;在网关节点不参与的情况下,设计密码和生物特征标识更新机制,保证二者的新鲜性.通过Dolev-Yao拓展威胁模型的分析与AVISPA的OFMC分析终端的仿真,结果证明该认证协议克服了Althobaiti协议安全缺陷,且对计算能力的需求小于公钥加密.权衡安全性与计算成本,该协议适用于资源受限且安全需求高的无线传感器网络应用.

关 键 词:无线传感器网络  信息安全  三因素  用户认证协议  生物特征标识  
收稿时间:2016-03-21

BTh-UAP:Biometric-Based Three-Factor User Authentication Protocol for Wireless Sensor Network
FANG Wei-dong,ZHANG Wu-xiong,YANG Yang,ZHANG Chuan-lei,CHEN Wei.BTh-UAP:Biometric-Based Three-Factor User Authentication Protocol for Wireless Sensor Network[J].Acta Electronica Sinica,2018,46(3):702-713.
Authors:FANG Wei-dong  ZHANG Wu-xiong  YANG Yang  ZHANG Chuan-lei  CHEN Wei
Abstract:To meet the application requirements in high-level security scenarios (i.e.,military,national security and banks),and further enhance the security for user authentication protocol in wireless sensor network (WSN),the biometric-based three-factor user authentication protocol (BTh-UAP) is proposed.For defending against the node compromise attack,the simulated attack,the man-in-the-middle attack and the privileged-insider attack in Althobaiti protocol,the smart card and password are taken as its basic secure factors,and the biometric identification that is operated by the biometric identification information generation and reply function is introduced as additional secure factor.In key management,a unique shared key for each node combined with gateway node is delivered to guarantee the independence and security in authentication phase.The shared key between user and gateway node is autonomously chosen to improve the security of the common communication channel.Furthermore,in the circumstance for non-participation of node,the updating scheme for password and biometric identification is designed to achieve the freshness.The results demonstrate that BTh-UAP not only overcomes Althobaiti's security flaws,but also its requirements for computing capability are less than the public-key encryption via using the Dolev-Yao threat model analysis and AVISPA's OFMC simulation.The tradeoff between security and computing costs indicates that BTh-UAP can be applied in high-level security scenarios for resource-constrained wireless sensor network.
Keywords:wireless sensor network (WSN)  information security  three-factors  user authentication protocol  biometric  
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号