期刊文献+

无线传感器网络中基于簇结构的公钥认证策略 被引量:2

Cluster-Based Strategies for Public Key Authentication in Wireless Sensor Networks
下载PDF
导出
摘要 在无线传感器网络中使用hash算法取代传统的公钥加密算法(PKC),提出了基于能量层和位置关系分簇算法的公钥认证策略(SPABEP),该策略可以有效地减少节点内存空间的消耗.在对SPABEP进行改进的基础上,又提出了基于部署信息的簇结构公钥认证策略(SPABDK),SPABDK更好地优化了节点内存空间消耗与通信负载的关系.仿真结果表明所提出的基于簇结构的公钥认证策略比传统的公钥认证策略具有更好的节能性能. This paper replaces Public Key Cryptography(PKC)with a hash algorithm, and presents a strategy for public key authentication based on energy band and position clustering algorithm (SPABEP) in wireless sensor networks, which could effectively reduce memory consumption. Improving SPABEP, this paper also presents a strategy for public key authentication based on deployment knowledge with cluster structure (SPABDK) , which could optimize the relationship between memory consumption and communication load. The simulation indicates that the above strategies have a better performance than the traditional public key authentication strategy in energy saving.
作者 蒋毅 史浩山
出处 《传感技术学报》 CAS CSCD 北大核心 2007年第6期1371-1375,共5页 Chinese Journal of Sensors and Actuators
基金 教育部博士点基金资助(20050699037)
关键词 无线传感器网络 公钥认证策略 分簇算法 部署信息 wireless sensor networks strategy for public key authentication clustering algorithm deployment knowledge
  • 相关文献

参考文献10

  • 1Chan H,Perrig A.Security and Privacy in Sensor Networks.IEEE Computer,2003,36(10):103-105.
  • 2Perrig A,Stankovic J,Wagner D.Security in Wireless Sensor Networks.Communications of the ACM,2004,47 (6):53-57.
  • 3Gura N,Patel A,Wander A,H.Hberle S.Chang Shantz.Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.CHES,August 2004:11-13.
  • 4Wander A S,Gura N,Eberle H,Gupta V,Shantz S C.Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks.Pervasive Computing and Communications[C] //2005.PerCom 2005.Third IEEE International Conference on8-12 March 2005:324-328.
  • 5Gaubatz G,Kaps J,and Sunar B.Public Keys Cryptography in Sensor Networks-Revisited[C]// The Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS),2004.
  • 6Malan D J,Welsh M,and Smith M D.A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks,Santa Clara,California,October 2004.
  • 7Shnayder V,Hempstead M,Chen B,Allen G W,and Welsh M.Simulating the Power Consumption of Large-Scale Sensor Network Applications[C]//Proceedings of the 2nd International Conference on Embedded Networked Sensor System,Baltimore,MD,USA,November3-5,2004:188-200.
  • 8Eastlake D and Jones P.Us Secure Hash Algorithm 1 (SHA1)[C]// IETF RFC 3174,September 2001.
  • 9Madiraju,Mallanda S,Kannan C,Durresi R,Iyengar A,S.S.EBRP:Energy Band Based Routing Protocol for Wireless Sensor Networks.Intelligent Sensors[C]//Sensor Networks and Information Processing Conference,2004.Proceedings of the 2004,14-17 Dec.2004:67-71.
  • 10Wenliang Du; Jing Deng; Hah Y S; Shigang Chen; Varshney,P.K.A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]// INFOCOM 2004.Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies Volume 1,March 2004:7-11.

同被引文献24

  • 1周贤伟,施德军,覃伯平.无线传感器网络认证机制的研究[J].计算机应用研究,2006,23(12):108-111. 被引量:6
  • 2Perrig A,Canetti R,Tygar J D,et al. Efficient authentication and signature of multicast streams over lossy channels[C]//Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland, California, USA : [s. n. ], 2000 : 56-73.
  • 3Perrig A, Szewczyk R, Wen V, et al. SPINS : security protocols for sensor networks [J]. Wireless Networks, 2002 (8):521-534.
  • 4Liu D, Ning P, Zhu S, et al. Practical broadcast authentication in sensor networks[C]//MobiQuitous.[S. l. ] :IEEE Computer Society ,2005 : 118-132.
  • 5Alfred d. Menezes,Paul C.van Oorschot, Vanstone S A.Handbook of applied Cryptography. Crc PressSeries on DiscreteMathematics and Its Applications, 1997.
  • 6J Menezes, P C V Oorschot, S A Und Vanstone. Handbook of Applied Cryptography[M]. Boca Raton, FL: CRC Press, 1997. 92-93.
  • 7D.Boneh, H.Shacham. Fast Variants of RSA[J]. RSA Laboratories' Cryptobytes, 2002, 5(1) : 1-8.
  • 8R. Watro, D.Kong, et al. TinyPK: Securing Sensor Networks with Public Key Technology[C]. Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, ACM Press,2004. 59-64.
  • 9Mathias Bohge, Wade Trappe. An Authentication Framework for Hierarchical Ad hoc Sensor Networks[C].WISE'03, 2005. 87-92.
  • 10Zinaida Benenson, Nils Gedick.e, Ossi Raivio. Realizing Robust User Authentication in Sensor Networks [C]. Workshop on Real World Wireless Sensor Networks,2005.135-142.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部