期刊文献+

无线传感器网络中密钥管理方案的综合评估 被引量:5

Comprehensive Evaluation of Key Management Scheme in Wireless Sensor Networks
下载PDF
导出
摘要 针对如何选取有效密钥管理方案是实现无线传感器网络安全的关键问题,提出一种密钥管理方案的综合评估方法。该方法利用总结出的密钥管理方案的评估指标,构造了综合评估结构模型。结合模糊方法和层次分析法,把评估密钥管理方案性能的主观因素限制在很小的范围内,有效地提高评估结果的准确度和可信度,可根据需要快速选择合适的密钥管理方案。经实验验证该方法是有效的。 To the crucial point of how choose effective key management scheme to realize security of wireless sensor network, this paper presents a comprehensive evaluation approach on key management. This method constructs model of comprehensive evaluation with metrics worked out on key management. Combined with fuzzy method and hierarchical analysis method, the subjective factors on evaluation functions of key management scheme are reduced to minimum. The accuracy and believability of the evaluation results are effectively improved. It ensures to choose effective key management scheme according to the requirement. Finally, the effectiveness of this measurement is verified by an experiment.
出处 《传感技术学报》 EI CAS CSCD 北大核心 2006年第3期913-916,共4页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目资助(60573050) 北京市优秀人才培养专项基金项目资助(20042D0500103)
关键词 无线传感器网络 密钥管理 综合评判 wireless sensor network key management comprehensive evaluation
  • 相关文献

参考文献11

  • 1Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless Sensor Networks:a Survey[J]. Computer Networks, 2002,38(4):393-422.
  • 2李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展[J].软件学报,2003,14(10):1717-1727. 被引量:620
  • 3Eschenauer L, Gligor V D. A Key management Scheme for Distributed Sensor Networks[C]. In:the 9th ACM Conference on Computer and Communication Security, 2002:41-47.
  • 4Chen H, Perrig A, Song D. Random Key Predistribution Schemes for Sensor Networks[C]//Proceeding of IEEE Symposium on Security and Privacy. Berkeley, California, 2003:197-205.
  • 5Liu D, Ning P. Establishing Pairwise Keys in Distributed Sensor Networks[C]//The 10th ACM Conference on Computer and Communications Security, 2003, 52-61.
  • 6Du W, Deng J,Han Y S, Varshney P K. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks[C]//The 10th ACM Conference on Computer and Communications Security, 2003:42-51.
  • 7Wadaa A, Olariu S, Wilson L, et al.Scalable Cryptographic key Management in Wireless Sensor Networks[C]//Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, (ICDDCSW'2004), 2004:1-7.
  • 8Jolly G, et al. A Low-Energy Key Management Protocol for Wireless Sensor Networks[C]//the Proceedings of 8th IEEE Symposium on Computers and Communications(ISCC '2003),Antalya Turkey, June 2003.
  • 9陈菲,宋志高,陈克非.无线传感器网络中对密钥管理评估指标研究[J].计算机仿真,2005,22(5):137-140. 被引量:17
  • 10张剑,龚俭.一种基于模糊综合评判的入侵异常检测方法[J].计算机研究与发展,2003,40(6):776-783. 被引量:27

二级参考文献51

  • 1Ganesan D, Govindan R, Shenker S, Estrin D. Highly-Resilient, energy-efficient multipath muting in wireless sensor networks.Mobile Computing and Communications Review, 2002,1(2):295-298.
  • 2Braginsky D, Estrin D. Rumor routing algorithm for sensor networks. In: Raghavendra CS, ed. Proceedings of the 1st Workshop on Sensor Networks and Applications. New York: ACM Press, 2002.
  • 3Girod L, Bychkovskiy V, Elson J, Estrin D. Locating tiny sensors in time and space: A case study. In: Manoli Y, Kim KS, eds.Proceedings of the International Conference on Computer Design. Piscataway: IEEE Press, 2002. 195-204.
  • 4Bulusu N, Estrin D, Girod L, Heidemann J. Scalable coordination for wireless sensor networks: Self-Configuring localization systems. 2001. http://lecs.cs.ucla.edu/-bulusu/papers/Bulusu01c.html.
  • 5Cerpa A, Estrin D. ASCENT: Adaptive self-configuring sensor networks topologies. In: Kermani P, ed. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2002.101-111
  • 6Elson J. Time synchronization services for wireless sensor networks. In: Kumar V, ed. Proceedings of the 15th International Parallel & Distributed Processing Symposium. 2001. Los Alamitos: IEEE Computer Press, 2001. 1965-1970.
  • 7Ye W, Heidemann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks. In: Kermani P, ed. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press,2002.91-100.
  • 8Heidemann J, Silva F, Intanagonwiwat C. Building efficient wireless sensor networks with low level naming. In: Marzullo K, ed.Proceedings of the 18th ACM Symposium on Operating System Principles. New York: ACM Press, 2001. 146-159.
  • 9Intanagonwiwat C, Govindan R, Estrin D, Heidemann J, Silva F. Directed diffusion for wireless sensor networking. ACM/IEEE Transactions on Networking, 2002, 11(1):2-16.
  • 10Liu J, Cheung P, Ouibas L, Zhao F. A dual-space approach to tracking and sensor management in wireless sensor networks. In:Reghavendrv CS, ed. Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications. New York:ACM Press, 2002. 162-173.

共引文献659

同被引文献57

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部