期刊文献+

一种改进的无线传感器网络随机密钥预分配算法 被引量:3

An Improved Random Key Predistribution Scheme in Wireless Sensor Network
下载PDF
导出
摘要 在分析现有无线传感器网络随机预分配密钥算法的基础上,通过同时引入q合成技术、多路增强技术与单向密钥序列技术,提出了增强的随机预分配密钥算法H-RKP,并以节点俘获攻击为例对其安全性进行了分析,证明该算法可以进一步提高现有随机预分配密钥算法的安全性. Based on the analysis of the existing Random Key Predistribution(RKP)schemes in wireless sensor network,a hash random key predistribution scheme H-RKP is proposed by introducing multi-path reinforcement scheme,q-composition scheme and one-way cryptographic hash function based random key predistribution algorithm.The security performance of the scheme under node capture attack is analized.The H- RKP scheme can further improve the security of the existing RKP schemes.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2006年第S1期710-713,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60473090)
关键词 无线传感器网络 随机密钥预分配 安全性 节点俘获 单向密钥序列 sensor network RKP security node capture attack one way hash function
  • 相关文献

参考文献5

  • 1Haowen C,Perrig A,Song D.Random key predistribution schemes for sensor networks[].IEEE Symposium on Research in Security and Privacy.2003
  • 2Spencer J.The strange logic of random graphs:Algorithms and combinatorics[]..2001
  • 3Perrig A,Szewczyk R,Wen V,et al.SPINS:Security protocols for sensor networks[].Seventh Annual International Conference on Mobile Computing and Networking(ACM MOBICOM‘).2001
  • 4Ramkumar M,Memon N.HARPS:Hashed random preloaded subset key distribution[].Cryptology ePrint Archive.2006
  • 5Eschenauer L,Gligor V D.A key-management scheme for distributed sensor network[].Conference on Computer and Communications Security.2002

同被引文献20

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 2张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,29(8):1427-1437. 被引量:20
  • 3李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 4Anish Arora,Prabal Dutta,Sandp Bapat,et al.A Line in the Sand:a wireless Sensor-Network For Target Deteetion,Classifieation and Tracking. ComPuter Networks:The international Joumal of Distributed Informatique . 2004
  • 5Gaubatz Gunnar,Kaps Jens-Peter,zturk Erdineo,et al.State of the Art in public-Key Cryptography for Wireless Sensor Networks. Second IEEE hitemational Workshops on pervasive Computing and Cotnmunication security (persec 2005) . 2005
  • 6G Acs,L Butty’’an,I vajda.The security proof of a Link-State Routing protocol for Wireless Sensor Networks. Mobile Adhoc and Sensor System (MASS),2007IEEE International Conference on . 2007
  • 7JOSEPH H SCHERRER,WILLIAM C GRUND.A Cy-berspace Command and Control Model. . 2009
  • 8CHALRS CLUM.Cyberspace Policy Review:Assuring a Trus-ted and Resilient Information and Communications Infra-structure. http://aupress.au.af.mil . 2010
  • 9KARMA GABRIELLE.Cyber Vision and Cyber Force Devel-opment. http://research.au.af.mil . 2010
  • 10F Allard,Jean-Marie Bonnin.An application of the context transfer protocol: IPsec in a IPv6 mobility environment. Access Networks & Workshops,Second International Conference on . 2007

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部