Citation: | Yicai HUANG, Sensen LI, Bowu BAO, Bin YU. Message Signature Scheme for ZigBee Network Security Positioning[J]. Journal of Electronics & Information Technology, 2019, 41(3): 702-708. doi: 10.11999/JEIT180064 |
In view of the security of message in ZigBee network node location, a message signature scheme with privacy protection is proposed. The proposed scheme is based on Elliptic Curve Cryptosystem (ECC) without bilinear pairing, and location request message signature algorithm with identity privacy protection and location reference message signature algorithm with coordinate privacy protection are put forward. It is proved theoretically that the proposed scheme can not only resist the various external attacks, such as forgery attack, replay attack, etc., but also has the function of privacy protection and identity tracking. Performance analysis shows that the proposed scheme has the advantages of computing overhead and communication overhead over similar schemes.
张扬勇. 基于ZigBee无线传感器网络RSSI定位算法[D]. [博士论文], 广东工业大学, 2015.
ZHANG Yangyong. RSSI position algorithm in wireless sensor network based on Zigbee[D]. [Ph.D. dissertation], Guangdong University of Technology, 2015.
|
PAK J M, AHN C K, PENG S, et al. Distributed hybrid particle/FIR filtering for mitigating NLOS effects in TOA based localization using wireless sensor networks[J]. IEEE Transactions on Industrial Electronics, 2016, 64(6): 5182–5191. doi: 10.1109/TIE.2016.2608897
|
DIAZ S E, MARTIN A D C, and SALAS J G. HALO4: Horizontal angle localization and orientation system with 4 receivers and based on ultrasounds[J]. Journal of Intelligent & Robotic Systems, 2016, 82(3): 1–13. doi: 10.1007/s10846-015-0283-2
|
JUNG Y J, JEON M H, AHN J K, et al. Location estimation algorithm based on AOA using a RSSI difference in indoor environment[J]. Journal of Advanced Navigation Technology, 2015, 19(6): 558–563. doi: 10.12673/jant.2015.19.6.558
|
JIN Rencheng, CHE Zhiping, XU Hao, et al. An RSSI-based localization algorithm for outliers suppression in wireless sensor networks[J]. Wireless Networks, 2015, 21(8): 2561–2569. doi: 10.1007/s11276-015-0936-x
|
LI Yuanyuan. Improved DV-HOP location algorithm based on local estimating and dynamic correction in location for wireless sensor networks[J]. International Journal of Digital Content Technology & Its Applications, 2011, 5(8): 196–202.
|
CHENG Wenhau, LI Jia, and LI Huaizhong. An improved APIT Location Algorithm for Wireless Sensor Networks[M]. Berlin: Springer, 2012: 113–119.
|
李华亮, 钱志鸿, 田洪亮. 基于核函数特征提取的室内定位算法研究[J]. 通信学报, 2017, 38(1): 158–167. doi: 10.11959/j.issn1000-436x.2017018
LI Hualiang, QIAN Zhihong, and TIAN Hongliang. Research on indoor localization algorithm based on kernel principal component analysis[J]. Journal on Communications, 2017, 38(1): 158–167. doi: 10.11959/j.issn1000-436x.2017018
|
叶阿勇, 许力, 林晖. 基于RSSI的传感器网络节点安全定位机制[J]. 通信学报, 2012, 33(7): 135–142. doi: 10.3969/j.issn.1000-436X.2012.07.017
YE Ayong, XU Li, and LIN Hui. Secure RSSI-based node position mechanism for wireless sensor networks[J]. Journal on Communications, 2012, 33(7): 135–142. doi: 10.3969/j.issn.1000-436X.2012.07.017
|
詹杰, 刘宏立, 刘大为, 等. 无线传感器网络中DPC安全定位算法研究[J]. 通信学报, 2011, 32(12): 8–17. doi: 10.3769/j.issn.1000-436x.2011.12.002
ZHAN Jie, LIU Hongli, LIU Dawei, et al. Research on secure DPC localization algorithm of WSN[J]. Journal on Communications, 2011, 32(12): 8–17. doi: 10.3769/j.issn.1000-436x.2011.12.002
|
CAPKUN S and HUBAUX J P. Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 221–232. doi: 10.1109/JSAC.2005.861380
|
LAZOS L and POOVENDRAN R. SeRLoc: Robust localization for wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2005, 1(1): 73–100. doi: 10.1145/1077391.1077395
|
靖刚, 吴俊敏, 徐宏力, 等. 基于对称密码的无线传感器网络安全定位[J]. 计算机工程, 2009, 35(12): 117–119. doi: 10.3969/j.issn.1000-3428.2009.12.041
JING Gang, WU Junmin, XU Hongli, et al. Secure localization based on symmetric cryptography in wireless sensor networks[J]. Computer Engineering, 2009, 35(12): 117–119. doi: 10.3969/j.issn.1000-3428.2009.12.041
|
李鹏, 王晓艳, 王汝传, 等. 一种基于哈希双向认证的无线传感网络定位安全方法[P]. 中国专利, CN104507082A, 2015.
LI Peng, WANG Xiaoyan, WANG Ruchuan, et al. Secure localization based on bidirectional hash authentication in wireless sensor networks[P]. China Patent, CN104507082A, 2015.
|
黄晓, 程宏兵, 杨庚. 基于身份的无线传感器网络定位认证方案[J]. 通信学报, 2010, 31(3): 115–122. doi: 10.3969/j.issn.1000-436x.2010.03.017
HUANG Xiao, CHENG Hongbing, and YANG Geng. Identity-based authentication localization scheme for wireless sensor network[J]. Journal on Communications, 2010, 31(3): 115–122. doi: 10.3969/j.issn.1000-436x.2010.03.017
|
王圣宝, 刘文浩, 谢琪. 无双线性配对的无证书签名方案[J]. 通信学报, 2012, 33(4): 93–98. doi: 10.3969/j.issn.1000-436X.2012.04.013
WANG Shengbao, LIU Wenhao, and XIE Qi. Certificateless signature scheme without bilinear pairings[J]. Journal on Communications, 2012, 33(4): 93–98. doi: 10.3969/j.issn.1000-436X.2012.04.013
|
吴黎兵, 谢永, 张宇波. 面向车联网高效安全的消息认证方案[J]. 通信学报, 2016, 37(11): 1–10. doi: 10.11959/j.issn.1000-436x.2016211
WU Libing, XIE Yong, and ZHANG Yubo. Efficient and secure message authentication scheme for VANET[J]. Journal on Communications, 2016, 37(11): 1–10. doi: 10.11959/j.issn.1000-436x.2016211
|
POINTCHEVAL D and STERN J. Security proofs for signature schemes[C]. Advances in Cryptology — EUROCRYPT’96, Berlin, Germany, 1996: 387–398.
|
MIRACL library on Certivox.com[OL]. https://www.certivox.com/miracl, 2018.
|