1430
计算机研究与发展2018,55(7)
Chen
a1.WITS:
Wenjie.Chen Lifeng,Chen Zhanglong,et
[10]
本文方案存在密钥托管问题.即每次数据发送
wireless sensor network for
intelligent transportation
方与地标交互得到基于位置的公私钥对的同时,4
个地标也同时生成了数据发送方的公私钥对,也就
是说,一旦地标被攻击者攻破,攻击者将会获得所有
与地标交互的发送方基于位置的公私钥对,攻击者
能够伪造发送方的签名,造成发送方密钥泄露问题.
为了解决上面提到的密钥托管问题,我们下一步计
划将聚合签名与基于位置相结合,设计基于位置或
区域的数据聚合方案.一方面,在协议过程中地标无
法计算出发送方的最终公私钥对.即便地标被攻击
者攻破,攻击者也无法获得发送方的最终公私钥对,
不会产生密钥泄露问题;另一方面,此方案能够确保
所有数据源都来自合法位置,并且面向物联网的数
据聚合能将物联网中的海量数据聚合成少量有效数
据,减少了通信开销,延长了网络寿命.
of the
1
st Int
on
Multi—Symp
Computer
system[C]//Proc
and
Computational Sciences.Piscataway,NJ:IEEE,2006:
635—641
Barrenetxea
F,Schaefer G,et a1.Wireless
[113
G,Ingelrest
sensor networks for environmental
monitoring:The
of the 20th IEEE Int
sensorscope experience[C]//Proc
Zurich Seminar on
Communications.Piscataway,NJ:IEEE,
2008:98-101
Merkle
certified
the
of
[123
[133
C.A
digital signature[C]//Proc
9th Annual Int Conf on Advances in
Spinger.1989:218—238
Cryptology.Berlin:
Zhu Hui,Li
Yumin.Certificateless
Hui,Wang
signcryption
Research
scheme without
of
Computer
pairing[J].Journal
and
Chinese)
Development,2010,47(9):1587—1594(in
(朱辉,李晖,王育民.不使用双线性对的无证书签密方案
EJ].计算机研究与发展,2010,47(9):i587-1594)
Ma Jinhua,Liu
redactable
Wei,et
on
[14]
Jianghua,Wu
a1.Survey
Research and
Computer
参 考
文
献
of
signatures[J].Journal
Chinese)
Development,2017,54(10):2144—2152(in
Gubbi
R,Marusic S,et a1.Internet of
[1]
J,Buyya
things
(马金花,刘江华,伍玮,等.可修订数字签名研究综述[J].
计算机研究与发展,2017,54(10):2144—2152)
architectural
and future
(IoT):
vision,
elements,
Generation
directions[J].Future
29(7):1645-1660
Roman
Computer Systems,2013,
Ghadafi E.
notions for decentralized
[15]
[16]
Stronger security
traceable attribute—based
and more efficient
signatures
of the th
the Internet of
[2]
R,Najera P,Lopez J.Securing
things
constructions
Ec]/Proc
1 5
Cryptographers’Track
[J].Computer,2011,44(9):5卜58
at the RSAConf.Berlin:Springer。2015:391—409
of Internet of
[3] Zhang Yuqing,Zhou Wei,Peng Anni.Survey
Liu
Donggang,Ning Peng.Location—based pairwise key
of
and
Research
Chinese)
things security[J].Journal
Computer
establishments for static sensor networks
of the
Ec]/Proc
of Ad Hoc and Sensor
Security
Development,2017,54(10):2130一2143(in
1
st ACM
on
Workshop
(张玉清,周威.彭安妮.物联网安全综述[J].计算机研究
与发展,2017,54(10):2130一2143)
Zhice,et
Networks.New York:ACM,2003:72-82
Jie.Location—based
[173 Yang Cungang,Xiao
pairwise key
[4] ZhangJiansong,Wang Zeyu,Yang
based IoT device authentication
a1.Proximity
of IEEE
establishment and data authentication for wireless sensor
EC]//Proc
of IEEE
networks[c]//Proc
IEEE,2006:247-252
IWIA’06.Piscataway,NJ:
INFOCOM’17.Piscataway,NJ:IEEE,2017:531—539
Wei,Chen
[5] Wang
Yingjie,Zhang QJan.Privacy—preserving
[18]
[19]
D,Mehta M,Medhi D,at a1.Location—aware
scheme for wireless sensor
Huang
key
location authentication in WiFi networks
using fine-grained
Wireless
management
of the 2ndACM
Networks.New
networks[c]//Proc
of Ad Hoc and Sensor
Security
Trans
on
physical layer signatures[J].IEEE
on
Workshop
Communications,2016.15(2):1218一1225
York:ACM,2004:29—42
Chen
K,et a1.Robustness,
Liang,Thombre S,Jarvinen
[63
[7]
Younis
M
F。Ghumman
M.Location—aware
K,Eltoweissy
and
location—based services for future
loT:
privacy in
security
combinatorial
scheme for clustered sensor
key management
Access,2017,5(99):8956-8977
survey[J].IEEE
Trans on
Parallel&.Distributed
networks[J].IEEE
D,et a1.Location—
I,Hallgren P,Damopoulos
Agadakos
Systems,2006,17(8):865—882
Yanchao.Liu Wei,Lou
[20] Zhang
the
Because
cannot
Conf
Annual
enhanced authentication using
IoT:
you
two
at
of the 32nd
Wenjing,et a1.Securing
be in
places
once[c]/Proc
sensor networks with location—based
of the
Conf.
keys[c]//Proe
on
York:ACM,
Computer Security Applications.New
6th Wireless Communications and
Networking
2016:251—264
E a1.Location—based
D,et
Piscataway,NJ:IEEE,2005:1909—1914
Chandran R,et a1.Position based
[83
[9]
j,Lara
Dey A,Hightower
services[J].IEEE
Pervasive
[21]
N,Goyal V。Moriarty
of the 29th Annual Int
Computing,2010,9(1):11-12
Brassil
P K,Netravali R.Traffic
signature—
J,Manadhata
cryptography[c]//Proc
Cryptology
Conf on
391-407
in
Cryptology.Berlin:Springer,2009:
based mobile device location
Trans
Advances
authentication[J].IEEE
on Mobile
Computing,2014,13(9):2156—2169
万方数据
全部评论(0)