期刊文献+

WSAN网络密钥管理模型的研究 被引量:2

RESEARCH ON KEY MANAGEMENT MODEL FOR WSANS
下载PDF
导出
摘要 无线传感器和反应器网络(wireless sensor and actor network,WSAN)由三种具有不同级别能力和作用的节点构成,节点的异构性导致单纯使用一种安全模型将无法满足不同节点对性能和安全性的要求。为此,本文首次提出了一种复合式的安全模型,根据节点的能力和作用将WSAN网络分为两层,不同层通过应用不同的安全机制,实现不同级别的安全服务。另外,本模型通过多种方式降低系统开销,力求达到安全和性能的平衡。 Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions, Because of these heterogeneities, current network security mechanisms would be hard to satisfy the security/cost requirements of all types of nodes. In this paper, we propose an integrated security approach, which splits the WSAN network into two layers according to nodes' functionalities and capacities. Different security mechanisms are provided to achieve the security services at corresponding levels. Fttrthermore, several methods are also used to reduce the system costs.
出处 《计算机应用与软件》 CSCD 北大核心 2005年第10期31-33,共3页 Computer Applications and Software
基金 江苏省自然科学基金项目(BK2005208) 973项目(2002CB312002)
关键词 无线传感器和反应器网络 安全服务 密钥管理 SAN网络 管理模型 network 密钥 SENSOR 安全模型 反应器网络 Wireless sensor and actor network Security service Key management
  • 相关文献

参考文献9

  • 1I, F. Akyildiz and I. H. Kasimoglu. Wireless Sensor and Actor Networks:Research Challenges. Ad Hoc Networks Journal (Elsevier), 2004, 2(4):351-367.
  • 2H. Chan, A. Perrig, D. Song. Random Key Pre-distribution Schemes for Sensor Networks. In: Proc of 2003 IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Computer press, 2003.197-213.
  • 3B. Dutertre, S. Cheung, J. Levy. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust. SDL, Tech Rep:SRI-SDL-04-02, 2004-4-6.
  • 4L. Eschenaner, V.D. Gligor. A key-Management Scheme for Distributed Sensor Networks. In: Proc of the 9th ACM Conference on Computer and Communications Security. Washington: ACM Press, 2002.41-47.
  • 5J.P. Hubaux, L. Buttyan, S. Capkun, The Quest for Security in Mobile Ad Hoc Networks, In: Proc of the ACM Symposium on Mobile Ad Hoc Networking and Computing. Long Beach: ACM 2001. 146-155.
  • 6J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, S. Lu. Adaptive Security for Multi-layer Ad-hoc Networks. Special Issue of Wireless Communications and Mobile Computing, 2002,2: 533-547.
  • 7H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-Securing Ad Hoc Wireless Networks. In: Proc of the Seventh IEEE Symposium on Computers and Communications. Taormina: IEEE Computer press, 2002.567-574.
  • 8R. Perlman. An Overview of PKI Trust Models. IEEE Network magazine,1999, 13(6):38-43.
  • 9A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security protocols for sensor networks. In: Proc of the seventh annual international conference on Mobile computing and networking. Rome: ACM Press,2001. 189-199.

同被引文献13

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部