期刊文献+

无线传感器网络随机密钥预分配改进方案 被引量:3

Improved scheme based on random key predistribution for wireless sensor network
下载PDF
导出
摘要 由于无线传感器网络节点能量、存储能力和计算能力的有限性,使传统的网络安全方案受到挑战。针对无线传感器网络的特点,在预共享密钥和随机密钥分发方案的基础上,提出了一种密钥分配方案。该方案采用只保存密钥池中密钥ID号的方法,节省了节点的存储空间。同时,考虑到传感器节点自身资源有限的特点,在满足加密需要的前提下,通过减少会话步骤、简化计算方法来降低传感器节点的工作负荷,从而使得传感器节点存储空间和通信开销都非常小,大大提高了传感器网络的工作效率。 Due to the limitation of the nodes energy and the limitation of memory resources and computation ability in the Wireless Sensor Network ( WSN), the traditional network security is challenged. Fully considering the characteristics of WSN, a key distribution scheme was proposed based on pre-shared key and random key distribution scheme, in which only ID- number of key in key pool was saved so as to save memory resources of sensor nodes. Furthermore, in view of the characteristics of resource limitation of sensor nodes, the working load of nodes was reduced through decreasing conversation steps and simplifying computation approach under the premise of satisfying the encryption needed. Thus in the scheme, the memory resource of the nodes and the correspondence cost are extremely small, and the working efficiency of the sensor network is improved greatly.
出处 《计算机应用》 CSCD 北大核心 2008年第6期1388-1391,共4页 journal of Computer Applications
关键词 无线传感器网络 网络安全 密钥分配 Wireless Sensor Network (WSN) network security key distribution
  • 相关文献

参考文献11

  • 1郎为民,杨宗凯,吴世忠,谭运猛.一种基于无线传感器网络的密钥管理方案[J].计算机科学,2005,32(4):147-148. 被引量:10
  • 2AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. A survey on sensor networks [ J]. IEEE Communications, 2002, 40 (8):102 - 114.
  • 3CHAN HAO-WEN, PERRIG A. Security and privacy in sensor networks [ J]. IEEE Computer, 2003, 36(10) : 103 - 105.
  • 4PERRIG A, STANKOVIC J, WAGNER D. Security in wireless sensor networks [ J]. Communications of the ACM, 2004, 47(6):53 -57.
  • 5CHAN H , PERRIG A , SONG D . Random key predistribution schemes for sensor networks [ C]// Proceedings of IEEE 2003 Symposium on Research in Security and Privacy. Washington: IEEE Computer Society, 2003:197 -213.
  • 6周贤伟,孙晓辉,覃伯平.无线传感器网络密钥管理方案的研究[J].计算机应用研究,2007,24(1):144-147. 被引量:11
  • 7ESCHENAUER L, GLIGOR V. A key-management scheme for distributed sensor networks [ C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. New York: ACM Press, 2002:41-47.
  • 8BOLLOBAS B, FULTON W, KATOK A, et al. Rand Graphs [M]. 2nd ed. Cambridge: Cambridge University Press, 2001:160 -200.
  • 9BLOM R. An optimal class of symmetric key generation systems [ C]// Advances in Cryptology: Proceedings of EUROCRYPT 84, LNCS 209. Berlin: Springer-Verlag, 1984:335-338.
  • 10BLUNDO C, SANTIS D A, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences[ C]// Advances in Cryptology: CRYPTO'92. Berlin: Springer-Verlag, 1993:471-486.

二级参考文献53

  • 1黄玲.无线传感器网络简述[J].传感器世界,2005,11(10):36-40. 被引量:11
  • 2Akyildiz I F, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks. IEEE Communications, 2002, 40(8):102~114
  • 3Chan H, Perrig A. Security and Privacy in Sensor Networks.IEEE Computer, 2003, 36(10):103~105
  • 4Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks. Communications of the ACM, 2004, 47(6): 53~57
  • 5Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In:Proc. of IEEE 2003 Symposium on Research in Security and Privacy, Berkeley, CA: IEEE Computer Society, 2003. 197~213
  • 6Jolly G, Kuscu M C, Kokate P, et al. A Low-Energy Key Management Protocol for Wireless Sensor Network. In: Proc. of the Eighth IEEE Intl. Symposium on Computers and Communication (ISCC'03). Turkey: July 2003, 1:335~340
  • 7Du W, Deng J, Han Y S, Varshney P. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS), Washington: ACM Press, Oct. 2003. 1~10
  • 8Wadaa A, Olariu S, Wilson L, et al. Sealable Cryptographic Key Management in Wireless Sensor Networks. In:Proc. of the 24th Intl. Conf. on Distributed Computing Systems Workshops (ICDCSW'04). Tokyo:IEEE Computer Society, March, 2004.796~802
  • 9Du W, Deng J, Han Y S, et al. A Key Management Scheme for Wireless Sensor Networks Using Deploying Knowledge. In:Proc. of INFOCOM2004. Hong Kong: IEEE Computer Society,March 2004. 172~183
  • 10M Eltoweissy,H Heydari,L Morales,et al.Combinatorial Optimization for Key Management in Secure Multicast Environments[J].Journal of Network and System Management,Kluwer Publishing,2004.

共引文献31

同被引文献26

  • 1高振国,赵蕴龙,李香,蔡绍滨,王春生,崔建文.GloMoSim无线网络仿真器剖析[J].系统仿真学报,2006,18(z2):672-675. 被引量:9
  • 2王绪安,杨晓元,张敏情,钟卫东.基于单向函数动态安全的组播密钥分配方案[J].计算机工程,2005,31(4):158-159. 被引量:1
  • 3王玲.网络信息安全的数据加密技术[J].信息安全与通信保密,2007,29(4):64-65. 被引量:33
  • 4黄鑫阳,杨明.无线传感器网络密钥管理研究综述[J].计算机应用研究,2007,24(3):10-15. 被引量:19
  • 5工业无线网络WIA规范[S].ICS25.040.
  • 6Li L, Wang R C, Jiang B, et al. Research of layer-duster key management scheme on wireless sensor networks [J].Journal of Electronics&Information Technology, 2006, 28 (12) : 2394- 2397.
  • 7Eschenauer L, Gligor V D. A key management scheme for distributed sensor networks [A]. Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington, DC, USA. 2002: 41-47.
  • 8Chuang Pojen, Chao Tunhao, Li Boyi. A scalable grouping random key pre - distribution scheme for large scale distributed sensor networks [A]. Proceeding of the 3rd International Conference on Information Technology and Applications [C]. [S1]: [Sn], 2005.
  • 9工业无线网络WIA规范[S].ICS25.040,2008.
  • 10Perrig A, Szewczyk R, Tygar J D, etal. SPINS : security protocols for sensor networks [ J ]. Wireless Networks,2002,8 ( 5 ) :521 - 534.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部