期刊文献+

基于部署信息的无线传感器网络密钥管理方案 被引量:10

Key Management Scheme for Wireless Sensor Networks Based on Deployment Knowledge
下载PDF
导出
摘要 在充分考虑无线传感器网络自身特点的基础上,针对现有无线传感器网络密钥管理中存在的问题,利用基于身份的加密算法,提出一个基于部署信息的无线传感器网络密钥管理方案(KMSBDK)。从该方案的安全性、连通性、可扩展性、有效性等方面进行分析,并与现有一些典型方案进行比较。结果表明,KMSBDK有较好的性能。 According to the characteristics of Wireless Sensor Networks(WSN) and the defects in current key management schemes, a key management scheme(KMSBDK) based on deployment knowledge is presented using Identity-Based Cryptography(IBC). The scheme is analyzed from security, key connectivity, scalability and efficiency. Compared with some current popular schemes, KMSBDK achieves better performance.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第6期145-147,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60702037) 教育部博士点学科基金资助项目(20030056007) 中国博士后科学基金资助项目(2006040018)
关键词 无线传感器网络 密钥管理 基于身份的密码系统 Wireless Sensor Networks(WSN) key management Identity-Based Cryptography(IBC)
  • 相关文献

参考文献10

  • 1Akyildiz I F, Weilian S, Yogesh S, et al. A Survey on Sensor Networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Networks[C]//Proc.of the 9th ACM Conf. on Computer and Communications Security. Washington D. C., USA: [s. n.], 2002: 41-47.
  • 4Zhu Sencun, Setia S. LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks[C]//Proc. of the 10th ACM Conf. on Computer and Communications Security. Washington, D. C., USA: ACM Press, 2003: 62-72.
  • 5Wander A S, Gura N, Eberle H, et al. Energy Analysis of Public-key Cryptography for Wireless Sensor Networks[C]//Proc. of the 3rd IEEE International Conference on Pervasive Computing. Galveston, Texas, USA: [s. n.], 2005: 324-328.
  • 6Geng Yang, Chunming Rong, Christian Veigner, et al. Identity-based Key Agreement and Encryption for Wireless Sensor Networks[J]. Journal of China Universities of Posts and Telecommunications, 2006, 13(4): 54-60.
  • 7Zhang Yanchao, Liu Wei, Lou Wenjing, et al. Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks[J]. IEEE Journal on Selected Areas in Commnuications, 2006, 24(2): 247-260.
  • 8Du Wenliang, Deng Jing, Yunghsiang S, et al. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]//Proc. of INFOCOM'04. Hong Kong, China: [s. n.] 2004.
  • 9Boneh D, Franklin M. Identify-based Encryption form the Weil Pairing[J]. Joumai of Computing, 2003, 32(3): 586-615.
  • 10Hankerson D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography[M]. New York, USA: Springer-Verlag, 2004.

二级参考文献1

共引文献110

同被引文献91

引证文献10

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部