期刊文献+

WSN的对偶密钥路径本地搜索算法

Localized Searching Algorithm of Pairwise Key Path in WSN
下载PDF
导出
摘要 无线传感器网络中基于规则网络的密钥预置方案具有预置开销小、寻径快等特点,但这类方案直接对偶密钥建立的概率较低。该文基于已经存在的节点连通集团,针对传感器网络对偶密钥连通图,提出层次连通框架,定义节点层次连通度,给出节点本地搜索算法。仿真结果表明该算法能提高节点的平均密钥连通度。 Key pre-distribution schemes based on regular network such as hypercube have several advantages in Wireless Sensor Networks(WSN). Examples are lower storage cost and able to find a proper key path more quickly. However, the probabillity to establish direct keys is fairly low in hypercube-based key pre-distribution. Based on available connected components, the framework of hierarchical connectivity is presented in key-sharing graph of sensor networks. The definition of node's hierarchical degree is included, and also localized searching algorithm is proposed. Experiments show that presented algorithm do improve node's average key-sharing degree.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第21期150-152,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773047) 湖南省教育厅基金资助项目(06B005)
关键词 对偶密钥 无线传感器网络 密钥连通图 pairwise key Wireless Sensor Networks(WSN) key-sharing graph
  • 相关文献

参考文献5

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2Eschenauer L, Gligor V D. A Key-management Scheme for Distributed Sensor Networks[C]//Proc. of the 9th ACM Conf. on Computer and Communications Security. [S. l.]: ACM Press, 2002.
  • 3Liu Donggang, Ning Peng, Li Rongfang. Establishing Pairwise Keys in Distributed Sensor Networks[J]. ACM Transactions on Information and System Security, 2005, 8(1): 41-77.
  • 4Li Ping, Lin Yaping. A Further Approach on Hypercube-based Pairwise Key Establishment in Sensor Networks[C]//Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing. Berlin, Germany: Spriuger-Verlag, 2006.
  • 5苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111

二级参考文献34

  • 1Chong CY,Kumar SP.Sensor networks:Evolution,opportunities,and challenges.Proc.of the IEEE,2003,91(8):1247-1256.
  • 2Krishnamachari L,Estrin D,Wicker S.The impact of data aggregation in wireless sensor networks In:Proc.of the 22nd IEEE Int'l Conf.on Distributed Computing Systems Vienna:IEEE Computer Society,2002.575-578.
  • 3Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291http://www.jos.org.cn/1000-9825/14/1282.htm
  • 4Perrig A,Szewczyk R,Wen V,Culler D,Tygar JD.SPINS:Security protocols for sensor networks.In:Proc.of the 7th Annual Int'l Conf.on Mobile Computing and Networks.Rome ACM Press,2001.189-199.
  • 5The official website of the ZigBee alliances.http://www.zigbee.org
  • 6Doumit S,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks.MILCOM 2003-IEEE Military Communications Conf,2003,22(1):609-614.
  • 7Akyildiz IF,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor networks:A survey.Computer Networks,2002,38(4):393-422.
  • 8Huang Q,Cukier J,Kobayashi H,Liu BD,Zhang JY.Fast authenticated key establishment protocols for wireless sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.San Diego:ACM Press,2003.141-150.
  • 9Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security (CCS2003).Washington D.C.,2003.62-72.
  • 10Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,2003.197-213.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部