期刊文献+

基于密钥联系表的无线传感器网络密钥管理方案 被引量:7

New key management scheme of wireless sensor networks based on key relation table
下载PDF
导出
摘要 考虑到多播密钥管理必须满足前向私密性、后向私密性、抗同谋破解、可扩展性以及健壮性等安全需求,同时针对于无线传感器网络能源受限的特点,提出了一种新的基于门限机制和密钥联系表的密钥管理方案。通过把密钥映射于空间曲线和曲面上,该方案在小幅度增加计算复杂性的同时,对通信复杂性和存储复杂性进行了较大的优化。 Aimed at some security properties on key management for multicast such as forward confidentiality, backward confidentiality, resisting conspiracy-analysis, expansibility and robustness, and furthermore the obvious character of energy-constraint, a new key management scheme based on threshold mechanism & key relation table was proposed, which mapped keys' value onto the three-dimensional curves and surfaces. Although computing complexity increases within a little scale, the performance optimization of memory complexity as well as communication complexity were proposed.
出处 《通信学报》 EI CSCD 北大核心 2006年第10期13-18,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60573141 70271050) 国家高技术研究发展计划("863"计划)基金资助项目(2005AA775050) 江苏省自然科学基金资助项目(BK2005146) 江苏省高技术研究计划基金资助项目(BG2004004 BG2005038) 南京市高科技项目(2006软资105) 江苏省计算机信息处理技术重点实验室基金资助项目(kjs050001 kjs0606) 现代通信国家重点实验室基金资助项目(9140C1101010603) 江苏省高校自然科学研究计划资助项目(04KJB520095) 南京邮电大学青蓝计划资助项目(NY206041)~~
关键词 无线传感器网络 密钥管理 密钥联系表 门限方案 wireless sensor networks key management key relation table threshold scheme
  • 相关文献

参考文献11

  • 1LAN F A,SU W,YOGESH S.A survey on sensor networks[J].IEEE Communications Magazine,2002,40(8):102-114.
  • 2SAGDUYU Y E,EPAREMIDES A.The problem of medium access control in wireless sensor networks[J].Wireless Communications,IEEE,2004,11(6):44-53.
  • 3XIN Z,RILEY G F.Energy-aware on-demand scatter-net formation and routing for bluetooth based wireless sensor networks[J].IEEE Communications Magazine,2005,43(7):126-133.
  • 4李晖,彭志威,陈克非.无线传感器网络及其安全问题[J].中兴通讯技术,2004,10(B10):30-34. 被引量:13
  • 5CHEN W P,HOU J C,LUI S.Dynamic clustering for acoustic target tracking in wireless sensor networks[J].IEEE Transactions on Mobile Computing,2004,3(3):258-271.
  • 6ROBERTO D P,LUIGI V M,YEE W L.LKHW:a directed diffusion-based secure multicast scheme for wireless sensor networks[A].Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPPW'03)[C].Kaohsiung,Taiwan,2003.362-369.
  • 7徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 8ZHEN Y,YONG G.A robust group-based key management scheme for wireless sensor networks[A].2005 IEEE Wireless Communications and Networking Conference[C].New Orleans,LA USA,2005.1915-1920.
  • 9LIN T H,KAISER W J,POTTIE G J.Integrated low-power communication system design for wireless sensor networks[J].IEEE Communications Magazine,2004,42(12):142-150.
  • 10LAURENT E,VIRGIL D G.A key-management scheme for sensor networks[A].The 9th ACM Conference on Computer and Communication Security (CCS)[C].Washington DC,USA,2002.41-47.

二级参考文献16

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献76

同被引文献144

引证文献7

二级引证文献139

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部