期刊文献+

无线传感器网络中抗共谋的自愈组密钥分配方案 被引量:4

Self-Healing Group Key Distribution Scheme with Collusion Attack Resistance Capability for Wireless Sensor Networks
下载PDF
导出
摘要 针对现有基于双向Hash链技术的自愈组密钥分配方案不能抵抗撤销节点和新加入节点的共谋攻击问题,并进一步提高现有方案的性能,提出了一种适用于无线传感器网络的有效的抗共谋攻击的自愈组密钥分配方案。方案对传统的双向Hash链进行了结构性改造,在有撤销节点的会话中,用随机值替换前向密钥,使得已被撤销节点无法和新加入节点共谋获取它们未被授权的会话密钥,消除了共谋攻击对网络构成的安全威胁,更适用于俘获节点攻击高发的网络环境。方案还考虑了在实际网络环境中,并不是在每一个会话都有节点被撤销这一个实际情况,减少了通信开销和能量消耗。安全性和性能分析与仿真结果表明,方案在保证更好安全性的同时,降低了通信开销。 To resolve the collusion resistance problem in the dual directional Hash chain(DDHC)-based self-healing group key distribution (SGKD)schemes and improve the performance of previous SGKD schemes, an efficient collusion attack resistant SGKD scheme for wireless sensor networks is proposed. In the proposed scheme, the structure of traditional DDHC is improved by replacing the forward key with a random value in sessions with revoked users, which makes that revoked sensor nodes cannot collude with new joined sensor nodes to recover unauthorized session keys, eliminates the threat of the collusion attack on the network and is more suitable for the network environment with high node capture attack. Moreover, the fact that sensor nodes are revoked from the group not in all sessions in a real-world network is taken into consideration, which contributes to reducing the communication overhead and energy consumption. Security analysis and simulation results show that our proposed scheme not only provides a stronger security, but also reduces the communication overhead.
出处 《传感技术学报》 CAS CSCD 北大核心 2013年第2期221-227,共7页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61272045) 杭州电子科技大学科学研究基金项目(KYF085609014)
关键词 无线传感器网络 安全组通信 自愈组密钥分配 双向Hash链 wireless sensor networks(WSNs) secure group communication self-healing group key distribution dual directional Hash chain
  • 相关文献

参考文献16

  • 1王秋华,赵泽茂.无线传感器网络中长生命期的自愈组密钥分配方案[J].传感技术学报,2011,24(7):1075-1080. 被引量:1
  • 2覃伯平,周贤伟,杨军.无线传感器网络中密钥管理方案的综合评估[J].传感技术学报,2006,19(3):913-916. 被引量:5
  • 3Staddon J, Miner S, Franklin M, et al. Self-Healing KeyDistribution with Revocation [ C]//Proc. of. IEEE Symposium onSecurity and Privacy, 2002,241 -257.
  • 4Liu D, Ning P, Sun K. Efficient Self-Healing Group KeyDistribution with Revocation Capability [ C] //Proc. of the 10thACM Conference on Computer and Communications Security,Washington,DC , USA ,2003,27-31.
  • 5Blundo C,Darco P, Santis A D,et al. Design of Self-Healing KeyDistribution Schemes [ J]. Design Codes and Cryptography, 2004,32(32) :15-44.
  • 6Hong D, Kang J. An Efficient Key Distribution Scheme withSelfhealing Property [ J]. IEEE Communication Letters,2005:759-761.
  • 7Dutta R,E. Change C,Mukhopadhyay S. Efficient Self-Healing KeyDistribution with Revocation for Wireless Sensor Networks UsingOne Way Key Chains[ C]//Proc. of ACNS*2007 ,2007 ,385-400.
  • 8Song H,Tian B, He M. Efficient Threshold Self-Healing KeyDistribution with Sponsorization for Infrastructureless WirelessNetworks [ J]. IEEE Trans. Wireless Communications ,2009,8 (4):1876-1887.
  • 9Dutta R,Mukhopadhyay S,Collier M. Computationally Secure Self-Healing Key Distribution with Revocation in Wireless Ad HocNetworks[ J]. Ad Hoc Networks,2010,8 :597-613.
  • 10Jiang Y, Lin C, Shi M. Self-Healing Group Key Distribution withTime-Limited Node Revocation for Wireless Sensor Networks[ J].Ad Hoc Networks,2007,5(1) :14-23.

二级参考文献25

  • 1杜大海,刘建伟,张其善,李晓白.WSNs中轻量级密钥管理方案设计[J].传感技术学报,2007,20(12):2631-2634. 被引量:4
  • 2陈菲,宋志高,陈克非.无线传感器网络中对密钥管理评估指标研究[J].计算机仿真,2005,22(5):137-140. 被引量:17
  • 3覃伯平,周贤伟,杨军.无线传感器网络中密钥管理方案的综合评估[J].传感技术学报,2006,19(3):913-916. 被引量:5
  • 4Staddon J, Miner S, Franklin M, et al. Self-Healing Key Distribution with Revocation [ C ]//Proc. of IEEE Symposimn on Security and Privacy ,2002:241-257.
  • 5Liu D, Ning P, Sun K. Efficient Self-Healing Group Key Distribution with Revocation Capability[ C ]//Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA,2003, 27-31.
  • 6More S, Malkin M, Staddon J, et al. Sliding-Window Self-healing Key Distribution [ C ]//Proc. ACM Workshop on Survivable and Self-Reqenerative Systems,2003,82-90.
  • 7Blundo C, Darco P, Santis A D, et al. Design of Self-Healing Key Distribution Schemes [ J ]. Design Codes and Cryptography,2004, 32 : 15-44.
  • 8Hong D, Kang J. An Efficient Key Distribution Scheme with Selfhealing Property[ J ]. IEEE Communication Letters ,2005:759-761.
  • 9Dutta R,Mukhopadhyay S. Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network [ C ]//Proc. of Wireless Communications and Networking,2007:2963-2968.
  • 10Dutta R, Mukhopadhyay S, Dowling T. Trade-off Between Collusion Resistance and User Life Cycle in Self-healing Key Distributians with t-Revocation [ C ]//Proc. of the 2nd International Conference on the Applications of Digital Information and Web Technologies, 2009:603 -608.

共引文献4

同被引文献41

  • 1王国军,吕婷婷,过敏意.无线传感器网络中基于临时初始密钥的密钥管理协议[J].传感技术学报,2007,20(7):1581-1586. 被引量:8
  • 2Eschenauer L, Gligor V D.A Key-Management Scheme forDistributed Sensor Networks[C]/ / ACM CCS'02,2002:41-47.
  • 3Chan H,Perrig A,Song D.Random Key Predistribution Schemesfor Sensor Networks[C]/ / IEEE SP'03,2003:197-213.
  • 4Tian Biming, Han Song, Liu Liu, et al.Towards Enhanced KeyManagement in Multi-Phase ZigBee Network Architecture [J].Computer Communications 2012(35):579-588.
  • 5Arvind Seshadri, Mark Luk, Adrian Perrig.SAKE: SoftwareAttestation for Key Establishment in Sensor Networks[J].Ad HocNetworks,2011(9):1059-1067.
  • 6Zhu S,Setia S,Jajodia S.Leap:Efficient Security Mechanisms forLarge-Scale Distributed Sensor Networks[C]/ / ACM CCS,2003:62-72.
  • 7Liu Zhixin, Qing Chao, Zhen Ga, et al.A Distributed Energy-Efficient Clustering Algorithm with Improved Coverage in WirelessSensor Networks[J].Future Generation Computer Systems,2012(28):780-790.
  • 8Castelluccia C, Spognardi A.A Robust Key Pre-DistributionProtocol for Multiphase Wireless Sensor Networks [C]/ / IEEESecure Com,2007:351-360.
  • 9Jang J,Kwon T,Song J.A Time-Based Key Management Protocolfor Wireless Sensor Networks[C]/ / Information Security Practiceand Experience,2007:314-328.
  • 10Xinliang Z,Chin-Tser H,Manton M.Chinese Remainder TheoremBased Group Key Management[C]/ / Proceedings of the 45th ACMSoutheast Conference ( ACMSE 2007 ).Winston-Salem,Northarolina,USA:ACM Press,2007:266-271.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部