期刊文献+

一种用椭圆曲线密码构建的传感网络密钥管理方案 被引量:5

Key management scheme for WSN using ECC
下载PDF
导出
摘要 提出了一种基于椭圆曲线密码的传感网络密钥管理体制.该体制使用公钥密码技术来保护会话密钥协商,保证了网络的安全性、连通性和可扩展性.另一方面,在每次密钥协商时,将DH(Diffie-Hellman)交换的私钥重用作为签名所需要的一次性随机数k,实现了数字签名和密钥交换的集成.同时,响应方发送的第三条消息不使用签名而是简单地用带密钥哈希消息认证码来认证,使得双方的通信数据量和计算量大大减少,从而提高了体制的效率,满足了传感网络对计算能力和存储量的苛刻要求. With the development of related technology, public key cryptosystem can also be utilized to build the security mechanism of WSN. With the integration of signature and key exchange of ECC, we propose an efficient key management scheme for WSN. An analysis shows it is of high security and efficiency. It can also guarantee the connectivity and flexibility of the network. Moreover, it meets the requirement of the limited computation and storage resource of the WSN node.
作者 丁勇
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2008年第4期739-742,共4页 Journal of Xidian University
基金 广西区教育厅基金资助(ZT5800)
关键词 椭圆曲线密码 传感网络 密钥管理 数字签名 密钥交换 ECC sensor network key management digital signature key exchange
  • 相关文献

参考文献14

  • 1Eschenauer L, Gligor V D. A Key Management Scheme for Distributed Sensor Networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press, 2002: 41-47.
  • 2Pietro R D, Mancini L V. A Random Key Assignment for Secure Wireless Sensor Networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03). New York: ACM Press, 2003: 49-51.
  • 3Lauter K. The Advantages of Elliptic Curve Cryptography for Wireless Security [J]. IEEE Wireless Communications, 2004,11(1) :62-67.
  • 4Du W, Deng J, HAN Y S, et al. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks[J]. ACM Trans on Information and System Security, 2005, 8(2): 228-258.
  • 5Blom R. An Optimal Class of Symmetric Key Generation Systems[C]//Advance in Cryptography. London: Springer- Verlag, 1984: 335-338.
  • 6Blundo C, De Santis A, Kutten A, et al. Perfectly Secure Key Distribution for Dynamic Conference[C]//Advance in Cryptology-CRYPTO92 LCNS 740. London: Springer-Verlag, 1993:471-486.
  • 7Liu D, Ning P. Establishing Pairwise Keys in Distributed Sensor Networks[C]//Proceedings of 10^th ACM Conference on Computer and Communications Security. Washington: ACM Press, 2003: 53-61.
  • 8Price A, Kosaka K, Chatterjee S. A Secure Key Management Scheme for Sensor Networks[C]//Proceedings of the 10^th Americas Conference on Information Systems (AMC1S 2004). New York: [s. n. ], 2004; 55-58.
  • 9Malan D J, Welsh M, Smith M D. A Public Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography [C]//Proceedings of 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks. New York: IEEE, 2004: 71-79.
  • 10Watro R, Kong D, Cuti S, et al. TinyPK: Securing Sensor Networks with Public Key Technology[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004: 59-64.

二级参考文献2

共引文献1

同被引文献52

  • 1CHENG Hong-bing,YANG Geng,WANG Jiang-tao,HUANG Xiao.An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):31-38. 被引量:8
  • 2王保仓,胡予濮.高密度背包型公钥密码体制的设计[J].电子与信息学报,2006,28(12):2390-2393. 被引量:13
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4Merkle R C, Hellman M E. Hiding Information and Signatures in Trapdoor Knapsacks[J]. IEEE Trans on Information Theory, 1978, 24(5): 525-530.
  • 5Coster M J, Joux A, LaMacehia B A, et al. Improved Low-Density Subset Sum Algorithms [J]. Computational Complexity, 1992, 2(2) : 111-128.
  • 6Shamir A. A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem[J]. IEEE Trans on Information Theory, 1984, 30(5): 699-704.
  • 7Wang B C, Hu Y P. Diophantine Approximation Attack on a Fast Public Key Cryptosystem[C]//The 2nd Information Security Practice and Experience (ISPEC 2006) : LNCS 3903. Berlin: Springer, 2006: 25-32.
  • 8Lagarias J C. Knapsack Public Key Cryptosystems and Diophantine Approximation[C]//Advances in CryptologyCRYPTO 1983. New York: Plenum, 1984: 3-23.
  • 9Kunihiro N. New Definition of Density on Knapsack Cryptosystems[C]//Advances in Cryptology-Africacrypt 2008.. LNCS 5023. Berlin: Springer, 2008: 156-173.
  • 10Shor P W. Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal of Computing, 1997, 26(5): 1484-1509.

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部