期刊文献+

WSN中基于一次预共享密钥的安全管理方案

Security Management Scheme in WSN Based on the Onetime Pre-shared Key
下载PDF
导出
摘要 无线传感器网络在部署初始阶段,由于未被恶意者察觉或者破解存在难度,节点通常能够在一定时间内具有抵抗劫持的能力。该文基于此分析提出一种适合于静态网络的基于一次性预共享密钥的安全管理方案SMOPK,方案在无线传感器网络部署的初始阶段利用一次性顸共享密钥进行密钥协商等,从而在相邻节点间建立保密的安全连接,建立与实际拓扑一致的安全拓扑。分析表明SMOPK方案具有开销小安全性强的特点,适合于静态无线传感器网络的安全要求。 In the initial stage of the wireless sensor network deployment,nodes are able to resist being compromised due to not being detected or hard to be cracked by attackers.Based on Onetime Pre-Shared Key,a security management scheme-SMOPK was introduced for static network.The scheme uses onetime pre-shared key to agree a shared key,and builds secured links between each pair of neighbors to form a secured topology which complys with the actual topology.Analysis shows that the scheme has features of strong security and low overhead.
作者 刘玉
出处 《微型电脑应用》 2008年第10期5-6,4,共3页 Microcomputer Applications
关键词 密钥管理 无线传感器网络 静态拓扑 Key management Wireless sensor network Static topology
  • 相关文献

参考文献6

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2D.W. Carman, P.S. Kruus and B.J. Matt.Constraints and Approaches for Distributed Sensor Network Security [DB/OL]. NAI Labs Technical Report #00-010, available at h ttp: / / download.nai.com / products /media / nai/ zip / nailabs-r eport-00-010- final, zip ,2000- 9 - 1.
  • 3Dijiang Huang,Deep Medhi.Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach [ J ]. ACM Transactions on Sensor Networks,2007,3(3).
  • 4Eschenauer L,Gligor VD.A key-management scheme for distributed sensor networks [ A ]. Proc.of the 9th ACM Conf. on Computer and Communications Security [ C J,Washington DC: ACM Press,2002.41-47.
  • 5Haowen Chan, Adrian Perrig, Dawn Song. Random Key Predistribution Schemes for Sensor Network [ C ]. IEEE Symposium on Security and Privacy,2003,197.
  • 6Wenliang Du, Jing Deng, Yunghsiang S. Han , Pramod K.Varshney.A Pairwise Key Predistribution Scheme for Wireless Sensor Network[ C ]. The 10th ACM Conference on Computer and Communications Security,2003.

二级参考文献33

  • 1Chong CY,Kumar SP.Sensor networks:Evolution,opportunities,and challenges.Proc.of the IEEE,2003,91(8):1247-1256.
  • 2Krishnamachari L,Estrin D,Wicker S.The impact of data aggregation in wireless sensor networks In:Proc.of the 22nd IEEE Int'l Conf.on Distributed Computing Systems Vienna:IEEE Computer Society,2002.575-578.
  • 3Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291http://www.jos.org.cn/1000-9825/14/1282.htm
  • 4Perrig A,Szewczyk R,Wen V,Culler D,Tygar JD.SPINS:Security protocols for sensor networks.In:Proc.of the 7th Annual Int'l Conf.on Mobile Computing and Networks.Rome ACM Press,2001.189-199.
  • 5The official website of the ZigBee alliances.http://www.zigbee.org
  • 6Doumit S,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks.MILCOM 2003-IEEE Military Communications Conf,2003,22(1):609-614.
  • 7Akyildiz IF,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor networks:A survey.Computer Networks,2002,38(4):393-422.
  • 8Huang Q,Cukier J,Kobayashi H,Liu BD,Zhang JY.Fast authenticated key establishment protocols for wireless sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.San Diego:ACM Press,2003.141-150.
  • 9Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security (CCS2003).Washington D.C.,2003.62-72.
  • 10Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,2003.197-213.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部