电子学报 ›› 2018, Vol. 46 ›› Issue (3): 702-713.DOI: 10.3969/j.issn.0372-2112.2018.03.028

• 学术论文 • 上一篇    下一篇

基于生物特征标识的无线传感器网络三因素用户认证协议

房卫东1,2, 张武雄1,2, 杨旸1,2, 张传雷3, 陈伟4   

  1. 1. 中国科学院上海微系统与信息技术研究所无线传感网与通信重点实验室, 上海 200051;
    2. 上海无线通信研究中心, 上海 201210;
    3. 天津科技大学计算机科学与信息工程学院, 天津 300222;
    4. 中国矿业大学计算机科学与技术学院, 江苏徐州 221116
  • 收稿日期:2016-03-21 修回日期:2017-05-10 出版日期:2018-03-25
    • 通讯作者:
    • 张武雄
    • 作者简介:
    • 房卫东,男,1971年2月出生,山东济南人,博士,中国科学院上海微系统与信息技术研究所高级工程师,主要研究方向为无线传感器网络可信传输技术、信任管理、隐私保护.E-mail:weidong.fang@mail.sim.ac.cn;杨旸,男,1974年2月出生,江苏南京人,博士,中国科学院上海微系统与信息技术研究所研究员、博导,主要研究方向为无线传感器网络(物联网)、新一代移动通信系统(5G)、雾计算与网络技术,开放无线测试验证平台.E-mail:yang.yang@mail.sim.ac.cn;张传雷,男,1973年月出生,山东沂源人,博士,天津科技大学计算机科学与信息工程学院副教授,主要研究方向为计算机应用技术、无线传感器网络可信传输技术.E-mail:97313114@tust.edu.cn;陈伟,男,1978年9月出生,江苏徐州人,博士,中国矿业大学计算机科学与技术学院教授,主要研究方向为智能信息处理、无线通信、大数据与云计算.E-mail:chenw@cumt.edu.cn
    • 基金资助:
    • 国家自然科学基金 (No.61471346,No.61461136003); 上海市自然科学基金 (No.17ZR1429100); 上海市科技创新行动计划 (No.17511105903,No.17DZ1200302); 国家自然科学基金委员会-山西省人民政府煤基低碳联合基金 (No.U1510115); 青海省自然科学基金 (No.2016-ZJ-922Q); 青蓝工程资助; 中国博士后科学基金特别资助项目 (No.2013T60574); CEMEE国家实验室开放课题基金 (No.CEMEE2017K0303B)

BTh-UAP:Biometric-Based Three-Factor User Authentication Protocol for Wireless Sensor Network

FANG Wei-dong1,2, ZHANG Wu-xiong1,2, YANG Yang1,2, ZHANG Chuan-lei3, CHEN Wei4   

  1. 1. Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200051, China;
    2. Shanghai Research Center for Wireless Communication, Shanghai 201210, China;
    3. College of Computer Science and Information Engineering, Tianjin University of Science and Technology, Tianjin 300222, China;
    4. School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, Jiangsu 221116, China
  • Received:2016-03-21 Revised:2017-05-10 Online:2018-03-25 Published:2018-03-25
    • Corresponding author:
    • ZHANG Wu-xiong
    • Supported by:
    • National Natural Science Foundation of China (No.61471346, No.61461136003); National Natural Science Foundation of Shanghai Municipality,  China (No.17ZR1429100); Shanghai Science and Technology Innovation Action Plan (No.17511105903, No.17DZ1200302); National Natural Science Foundation of China - Shanxi Province Coal-Based Low Carbon Joint Fund (No.U1510115); Natural Science Foundation of Qinghai Province (No.2016-ZJ-922Q); Supported by Blue Project in Jiangsu Province; Supported by China Postdoctoral Science Foundation (No.2013T60574); CEMEE National Laboratory Open Foundation (No.CEMEE2017K0303B)

摘要: 为满足高安全级别场景(如军事、国家安全、银行等)的应用需求,进一步提高无线传感器网络用户认证协议的安全性,提出了基于生物特征识别的三因素用户认证协议.针对Althobaiti协议无法防御节点妥协攻击、模拟攻击、中间人攻击和内部特权攻击的安全缺陷,增加智能卡和密码作为协议基本安全因素,并利用生物特征标识信息生成函数与回复函数处理的生物特征标识作为附加安全因素;在密钥管理中,为每个节点配置了与网关节点共享唯一密钥,保证认证过程的独立性与安全性;实现用户自主选择与网关节点的共享密钥,提高公共信道通信的安全性;在网关节点不参与的情况下,设计密码和生物特征标识更新机制,保证二者的新鲜性.通过Dolev-Yao拓展威胁模型的分析与AVISPA的OFMC分析终端的仿真,结果证明该认证协议克服了Althobaiti协议安全缺陷,且对计算能力的需求小于公钥加密.权衡安全性与计算成本,该协议适用于资源受限且安全需求高的无线传感器网络应用.

关键词: 无线传感器网络, 信息安全, 三因素, 用户认证协议, 生物特征标识

Abstract:

To meet the application requirements in high-level security scenarios (i. e., military, national security and banks), and further enhance the security for user authentication protocol in wireless sensor network (WSN), the biometric-based three-factor user authentication protocol (BTh-UAP) is proposed. For defending against the node compromise attack, the simulated attack, the man-in-the-middle attack and the privileged-insider attack in Althobaiti protocol, the smart card and password are taken as its basic secure factors, and the biometric identification that is operated by the biometric identification information generation and reply function is introduced as additional secure factor. In key management, a unique shared key for each node combined with gateway node is delivered to guarantee the independence and security in authentication phase. The shared key between user and gateway node is autonomously chosen to improve the security of the common communication channel. Furthermore, in the circumstance for non-participation of node, the updating scheme for password and biometric identification is designed to achieve the freshness. The results demonstrate that BTh-UAP not only overcomes Althobaiti's security flaws, but also its requirements for computing capability are less than the public-key encryption via using the Dolev-Yao threat model analysis and AVISPA's OFMC simulation. The tradeoff between security and computing costs indicates that BTh-UAP can be applied in high-level security scenarios for resource-constrained wireless sensor network.

Key words: wireless sensor network (WSN), information security, three-factors, user authentication protocol, biometric

中图分类号: