期刊文献+

基于身份的无线传感器网络密钥系统 被引量:4

Research of Identity-based Key System Scheme for Wireless Sensor Network
下载PDF
导出
摘要 无线传感嚣网络(WSN)是一类由众多微型传感器节点通过自组织的方式构成的网络。随着在军事、环境监测等方面的应用逯渐成为现实,其有效和安全通信问题由于自身的特性(如能量、计算能力和节点存储资源等的局限性)而显得更加突出。本文首先比较详细地介绍了无线传感器网络安全结构及其面临的问题;其次重点讨论了无线传感器网络密钥系统相关的研究现状;然后给出了一种有效的基于身份的无线传感器网络密钥系统方案及与其它方案的仿真比较实验。仿真实验结果表明,我们方案较其它密钥系统方案在处理时间和节点存储需求方面具有优势。 Wireless sensor network is a kind of Ad hoc network consisted of hundreds or thousands or more of micro sensor nodes, which has been deployed for many practical applications, including military sensing and tracking, environment and security monitoring, equipment and human monitoring and tracking, etc. Due to limitations of power, computation capability and storage resources, security of wireless sensor networks has received considerable attention. In order to construct a secure network, it is an important challenge to find out suitable key establishment, distribution and encryption schemes for wireless sensor networks. The paper argues about the security concerns firstly and then . surveys the research of key system in wireless sensor network. Finally it presents an efficient key system scheme which is based on identity encryption algorithm for wireless sensor network. Simulation results among our scheme and other traditional key system schemes suggest that our scheme is feasible in wireless sensor network.
出处 《计算机科学》 CSCD 北大核心 2007年第10期116-119,共4页 Computer Science
基金 江苏省自然科学基金(编号:BK2004218) 江苏省"2006年青蓝工程青年骨干教师"资金资助计划
关键词 无线传感器网络 网络安全 密钥系统 Wireless sensor network, Network security, Key system
  • 相关文献

参考文献7

二级参考文献77

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2史龙,王福豹,段渭军,任丰厚.无线传感器网络Range-Free自身定位机制与算法[J].计算机工程与应用,2004,40(23):127-130. 被引量:114
  • 3郎为民,杨宗凯,吴世忠,谭运猛.一种基于无线传感器网络的密钥管理方案[J].计算机科学,2005,32(4):147-148. 被引量:10
  • 4郎为民,杨宗凯,吴世忠,谭运猛.无线传感器网络安全研究[J].计算机科学,2005,32(5):54-58. 被引量:27
  • 5I, F. Akyildiz and I. H. Kasimoglu. Wireless Sensor and Actor Networks:Research Challenges. Ad Hoc Networks Journal (Elsevier), 2004, 2(4):351-367.
  • 6H. Chan, A. Perrig, D. Song. Random Key Pre-distribution Schemes for Sensor Networks. In: Proc of 2003 IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Computer press, 2003.197-213.
  • 7B. Dutertre, S. Cheung, J. Levy. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust. SDL, Tech Rep:SRI-SDL-04-02, 2004-4-6.
  • 8L. Eschenaner, V.D. Gligor. A key-Management Scheme for Distributed Sensor Networks. In: Proc of the 9th ACM Conference on Computer and Communications Security. Washington: ACM Press, 2002.41-47.
  • 9J.P. Hubaux, L. Buttyan, S. Capkun, The Quest for Security in Mobile Ad Hoc Networks, In: Proc of the ACM Symposium on Mobile Ad Hoc Networking and Computing. Long Beach: ACM 2001. 146-155.
  • 10J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, S. Lu. Adaptive Security for Multi-layer Ad-hoc Networks. Special Issue of Wireless Communications and Mobile Computing, 2002,2: 533-547.

共引文献34

同被引文献35

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures [C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications. 2003:113-127.
  • 3Yu B,Xiao B. Detecting selective forwarding attacks in wireless sensor networks[C]//Proceedings of the 2nd International Workshop on Security in Systems and Networks (IPDPS2006 Workshop). Greece, 2006.
  • 4Shamir A. Identity-based cryptography and signature schemes [C]// Advances in Cryptology - CRYPTO'84, Lecture Notes in Computer Science. 1985,196 : 47-53.
  • 5Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy- efficient communication protocol for wireless microsensor networks[C]//Proceedings of the 33rd Hawaii International Conference on System Sciences. 2000.
  • 6Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]// Proceedings of Crypto 2001, Lecture Notes in Computer Science. 2001,2139 : 213-229.
  • 7Bulusu N, Heidemann J, Estrin D. GPS-less low-cost outdoor localization for very small devices[J]. IEEE Personal Cornmunications,2000,7(5) :28-34.
  • 8Perrig A,Szewezyk R, Tygar J D, et al. SPINS: security protocols for sensor networks[J].Wireless Networks, 2002, 8 (5) : 521-534.
  • 9Wander A S, Gura N, Eberle H, et al. Energy analysis of publickey cryptography for wireless sensor networks[C]//Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications. 2005 : 324-328.
  • 10Eschenauer L,Gligor V. A key management scheme for distributed sensor networks[C]//Proc, of the 9th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2002:41-47.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部