期刊文献+

无线传感器网络密钥管理方案的研究 被引量:11

Research on Key Management in Wireless Sensor Network
下载PDF
导出
摘要 安全机制中密钥管理方案的研究一直是无线传感器网络的研究热点。从无线传感器网络的安全分析入手,在分类描述分布式和分簇式密钥管理方案并分析其优缺点的基础上,提出几点设计密钥管理方案的研究设想。 Security is vital to determine whether wireless sensor network can be fully developed or not, and for network security, key management is the most vital at all. As a result, it is a continuously hot spot to research in this subject. Starting with the analysis of security in wireless sensor network, this paper describes several schemes of security key managements, discussing them in sorts of distributed and clustered, and comparing their advantages and disadvantages. Based on the discussion, it brings forward several research assumptions for designing security key management.
出处 《计算机应用研究》 CSCD 北大核心 2007年第1期144-147,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60573050)
关键词 无线传感器网络 网络安全 密钥管理 Wireless Sensor Network Network Security Key Management
  • 相关文献

参考文献14

  • 1I F Akyidiz,W Su,Y Sankarasubramaniam.Wireless Sensor Networks:A Survey[J].Computer Networks,2002,38(4):393-422.
  • 2黄玲.无线传感器网络简述[J].传感器世界,2005,11(10):36-40. 被引量:11
  • 3IETF.Mobile Ad hoc Networks Charter[EB/OL].http://www.ietf.org/ html.charters/ manet2charter.html.
  • 4任新辉,刘斌,徐勇军,等.无线传感器网络的通信安全[EB/OL].http://www.paper.edu.cn.
  • 5Bocheng Lai,Sungha Kim,IngrID Verbauwhede.Scalable Session Key Construction Protocol for Wireless Sensor Networks[C].Austin:IEEE Workshop on Large Scale Real-time and Embedded Systems(LARTES),2002.
  • 6Laurent Eschenauer,Virgil D Gligor.A Key-management Scheme for Distributed Sensor Networks[C].Proceedings of the 9th ACM Conference on Computer and Communication Security,2002.41-47.
  • 7Chan H W,Perrig A,Song D.Rondom Key Predistribution Schemes for Sensor Networks[C].Proc.of IEEE Symp.on Security and Privacy,2003.197.
  • 8D Liu,P Ning.Establishing Pair-wise Keys in Distributed Sensor Networks[C].The 10th ACM Conference on Computer and Communications Security,2003.
  • 9D Liu,P Ning.Location-based Pair-wise Key Establishments for Static Sensor Networks[C].Workshop on Security in Ad hoc and Sensor Networks(SASN),2003.
  • 10NIST.Advanced Encryption Standard (AES) Development Effort[EB/OL].http://csrc.nist.gov/encryption/aes/,2000.

二级参考文献20

  • 1J. Kulik, W. R. Heinzelman, and H. Balakrishnan.Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks[J]. Wireless Networks, vol. 8,2002.pp. 169-85.
  • 2C. Intanagonwiwat, R. Govindan, and D. Estrin.Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks[C]. Proc. ACM MobiCom 2000, Boston, MA, 2000, pp. 56-67.
  • 3W. Heinzelman, A. Chandrakasan and H. BalakrishnanEnergy-Efficient Communication Protocol for Wireless Microsensor Networks[C]. Proc. 33rd Hawaii Int'l. Conf.Sys. Sci., Jan. 2000.
  • 4C. Schurgers and M. B. Srivastava. Enegy Efficient Routing in Wireless Sensor Networks[C]. MILCOM Proc.Commun. For Network-Centric Ops,: Creating the Info.Force, McLean, VA, 2001.
  • 5L. Subramanian and R. H. Katz. An Architecture for Building Self Configurable Systems[C]. Proc. IEEE/ACM Workshop Mobile Ad Hot Net. and Comp., Boston, MA, Aug 2000.
  • 6I.F. Akyildiz,w. Su, Y. Sankarasubramaniam, E.Cayirci. Wireless sensor networks: a survey[J]. Computer Networks, vol. 38, 2002, pp. 393-341.
  • 7M.Z. Win and R. A. Scholtz, Impulse radio: How it works[C]. IEEE Communications Letters, vol. 2, no. 2, Feb.1998, pp. 36-38.
  • 8Klaus Finkenzeller. RFID Handbook(2^nd Edition)[M].John Wiley & Sons, Ltd., 2003.
  • 9D. B. Johnson, D. A. Maltz, Y.C. Hu, and J. G.Jetcheva, The Dynamic source routing protocol for mobile ad hoe networks (DSR)[DB/OL]. IETF Internet Draft, 2002,http://www.ietf.org/proceedings/02mar/I-D/draft-ietf-manet-dsr-07.txt.
  • 10C. Perkins, E. Royer, and S. Das. Ad-hoc On-demand istance Vector (AODV) routing, IETF Internet Draft[DB/OL]. 2001, http://www.ietf.org/proceedings/01 aug/I-D/draft-ietf-manet-aodv-08.txt.

共引文献10

同被引文献89

引证文献11

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部