Message Signature Scheme for ZigBee Network Security Positioning
-
摘要:
针对ZigBee网络节点定位中消息的安全性问题,该文提出一种带隐私保护的消息签名方案。方案基于椭圆曲线(ECC)上的无双线性对运算,设计了带身份隐私保护的定位请求消息签名算法和坐标隐私保护的定位参照消息签名算法。理论证明了所提方案可抵御伪造攻击、重放攻击等多种外部攻击,同时具备隐私保护、身份追踪等功能。性能分析结果表明,与同类方案相比,所提方案计算开销和通信开销均具有优势。
Abstract:In view of the security of message in ZigBee network node location, a message signature scheme with privacy protection is proposed. The proposed scheme is based on Elliptic Curve Cryptosystem (ECC) without bilinear pairing, and location request message signature algorithm with identity privacy protection and location reference message signature algorithm with coordinate privacy protection are put forward. It is proved theoretically that the proposed scheme can not only resist the various external attacks, such as forgery attack, replay attack, etc., but also has the function of privacy protection and identity tracking. Performance analysis shows that the proposed scheme has the advantages of computing overhead and communication overhead over similar schemes.
-
表 2 复杂计算次数统计表
-
张扬勇. 基于ZigBee无线传感器网络RSSI定位算法[D]. [博士论文], 广东工业大学, 2015.ZHANG Yangyong. RSSI position algorithm in wireless sensor network based on Zigbee[D]. [Ph.D. dissertation], Guangdong University of Technology, 2015. PAK J M, AHN C K, PENG S, et al. Distributed hybrid particle/FIR filtering for mitigating NLOS effects in TOA based localization using wireless sensor networks[J]. IEEE Transactions on Industrial Electronics, 2016, 64(6): 5182–5191. doi: 10.1109/TIE.2016.2608897 DIAZ S E, MARTIN A D C, and SALAS J G. HALO4: Horizontal angle localization and orientation system with 4 receivers and based on ultrasounds[J]. Journal of Intelligent & Robotic Systems, 2016, 82(3): 1–13. doi: 10.1007/s10846-015-0283-2 JUNG Y J, JEON M H, AHN J K, et al. Location estimation algorithm based on AOA using a RSSI difference in indoor environment[J]. Journal of Advanced Navigation Technology, 2015, 19(6): 558–563. doi: 10.12673/jant.2015.19.6.558 JIN Rencheng, CHE Zhiping, XU Hao, et al. An RSSI-based localization algorithm for outliers suppression in wireless sensor networks[J]. Wireless Networks, 2015, 21(8): 2561–2569. doi: 10.1007/s11276-015-0936-x LI Yuanyuan. Improved DV-HOP location algorithm based on local estimating and dynamic correction in location for wireless sensor networks[J]. International Journal of Digital Content Technology & Its Applications, 2011, 5(8): 196–202. CHENG Wenhau, LI Jia, and LI Huaizhong. An improved APIT Location Algorithm for Wireless Sensor Networks[M]. Berlin: Springer, 2012: 113–119. 李华亮, 钱志鸿, 田洪亮. 基于核函数特征提取的室内定位算法研究[J]. 通信学报, 2017, 38(1): 158–167. doi: 10.11959/j.issn1000-436x.2017018LI Hualiang, QIAN Zhihong, and TIAN Hongliang. Research on indoor localization algorithm based on kernel principal component analysis[J]. Journal on Communications, 2017, 38(1): 158–167. doi: 10.11959/j.issn1000-436x.2017018 叶阿勇, 许力, 林晖. 基于RSSI的传感器网络节点安全定位机制[J]. 通信学报, 2012, 33(7): 135–142. doi: 10.3969/j.issn.1000-436X.2012.07.017YE Ayong, XU Li, and LIN Hui. Secure RSSI-based node position mechanism for wireless sensor networks[J]. Journal on Communications, 2012, 33(7): 135–142. doi: 10.3969/j.issn.1000-436X.2012.07.017 詹杰, 刘宏立, 刘大为, 等. 无线传感器网络中DPC安全定位算法研究[J]. 通信学报, 2011, 32(12): 8–17. doi: 10.3769/j.issn.1000-436x.2011.12.002ZHAN Jie, LIU Hongli, LIU Dawei, et al. Research on secure DPC localization algorithm of WSN[J]. Journal on Communications, 2011, 32(12): 8–17. doi: 10.3769/j.issn.1000-436x.2011.12.002 CAPKUN S and HUBAUX J P. Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 221–232. doi: 10.1109/JSAC.2005.861380 LAZOS L and POOVENDRAN R. SeRLoc: Robust localization for wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2005, 1(1): 73–100. doi: 10.1145/1077391.1077395 靖刚, 吴俊敏, 徐宏力, 等. 基于对称密码的无线传感器网络安全定位[J]. 计算机工程, 2009, 35(12): 117–119. doi: 10.3969/j.issn.1000-3428.2009.12.041JING Gang, WU Junmin, XU Hongli, et al. Secure localization based on symmetric cryptography in wireless sensor networks[J]. Computer Engineering, 2009, 35(12): 117–119. doi: 10.3969/j.issn.1000-3428.2009.12.041 李鹏, 王晓艳, 王汝传, 等. 一种基于哈希双向认证的无线传感网络定位安全方法[P]. 中国专利, CN104507082A, 2015.LI Peng, WANG Xiaoyan, WANG Ruchuan, et al. Secure localization based on bidirectional hash authentication in wireless sensor networks[P]. China Patent, CN104507082A, 2015. 黄晓, 程宏兵, 杨庚. 基于身份的无线传感器网络定位认证方案[J]. 通信学报, 2010, 31(3): 115–122. doi: 10.3969/j.issn.1000-436x.2010.03.017HUANG Xiao, CHENG Hongbing, and YANG Geng. Identity-based authentication localization scheme for wireless sensor network[J]. Journal on Communications, 2010, 31(3): 115–122. doi: 10.3969/j.issn.1000-436x.2010.03.017 王圣宝, 刘文浩, 谢琪. 无双线性配对的无证书签名方案[J]. 通信学报, 2012, 33(4): 93–98. doi: 10.3969/j.issn.1000-436X.2012.04.013WANG Shengbao, LIU Wenhao, and XIE Qi. Certificateless signature scheme without bilinear pairings[J]. Journal on Communications, 2012, 33(4): 93–98. doi: 10.3969/j.issn.1000-436X.2012.04.013 吴黎兵, 谢永, 张宇波. 面向车联网高效安全的消息认证方案[J]. 通信学报, 2016, 37(11): 1–10. doi: 10.11959/j.issn.1000-436x.2016211WU Libing, XIE Yong, and ZHANG Yubo. Efficient and secure message authentication scheme for VANET[J]. Journal on Communications, 2016, 37(11): 1–10. doi: 10.11959/j.issn.1000-436x.2016211 POINTCHEVAL D and STERN J. Security proofs for signature schemes[C]. Advances in Cryptology — EUROCRYPT’96, Berlin, Germany, 1996: 387–398. MIRACL library on Certivox.com[OL]. https://www.certivox.com/miracl, 2018.