期刊文献+

WSN中基于一次预共享密钥的安全管理方案 被引量:3

Security Management Scheme in WSN Based on the Onetime Pre-shared Key
下载PDF
导出
摘要 无线传感器网络在部署初始阶段,由于未被恶意者察觉,或者破解存在难度,节点通常能够在一定时间内具有抵抗劫持的能力.基于此分析提出一种适合于静态网络的基于一次性预共享密钥的安全管理方案SMOPK,方案在无线传感器网络部署的初始阶段利用一次性预共享密钥进行密钥协商等,从而在相邻节点间建立保密的安全连接,建立与实际拓扑一致的安全拓扑.分析表明SMOPK方案具有开销小、安全性强的特点,适合于静态无线传感器网络的安全要求. In the initial deploying stage of wireless sensor networks, because of not being detected or hard to break by attackers, every node has ability to resist being hijacked. Based on onetime preshared key, a security management scheme SMOPK, suitable for static network, was introduced. The scheme used onetime pre-shared key to perform consultation of secret key, and therefore realizing secured links between neighboring nodes and building up a secured topology which is consistent with the actual wireless topology. Analysis showed that the scheme had strong security features with low cost.
作者 刘玉
机构地区 合肥学院管理系
出处 《合肥学院学报(自然科学版)》 2009年第1期32-34,49,共4页 Journal of Hefei University :Natural Sciences
基金 合肥学院2008年度院科研发展基金计划项目(08KY021ZR)资助
关键词 密钥管理 无线传感器网络 静态拓扑 key management wireless sensor network static topology
  • 相关文献

参考文献1

二级参考文献33

  • 1Chong CY,Kumar SP.Sensor networks:Evolution,opportunities,and challenges.Proc.of the IEEE,2003,91(8):1247-1256.
  • 2Krishnamachari L,Estrin D,Wicker S.The impact of data aggregation in wireless sensor networks In:Proc.of the 22nd IEEE Int'l Conf.on Distributed Computing Systems Vienna:IEEE Computer Society,2002.575-578.
  • 3Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291http://www.jos.org.cn/1000-9825/14/1282.htm
  • 4Perrig A,Szewczyk R,Wen V,Culler D,Tygar JD.SPINS:Security protocols for sensor networks.In:Proc.of the 7th Annual Int'l Conf.on Mobile Computing and Networks.Rome ACM Press,2001.189-199.
  • 5The official website of the ZigBee alliances.http://www.zigbee.org
  • 6Doumit S,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks.MILCOM 2003-IEEE Military Communications Conf,2003,22(1):609-614.
  • 7Akyildiz IF,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor networks:A survey.Computer Networks,2002,38(4):393-422.
  • 8Huang Q,Cukier J,Kobayashi H,Liu BD,Zhang JY.Fast authenticated key establishment protocols for wireless sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.San Diego:ACM Press,2003.141-150.
  • 9Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security (CCS2003).Washington D.C.,2003.62-72.
  • 10Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,2003.197-213.

共引文献29

同被引文献10

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部