期刊文献+

传感器网络中节点对偶密钥建立自学习算法研究

Research on Pairwise Key Establishment Based on Node's Self Learning Algorithm in Sensor Networks
下载PDF
导出
摘要 对偶密钥建立的有效性和安全性的折衷平衡是研究传感器网络中对偶密钥管理问题的焦点.提出了基于扩环矩阵向量预置的密钥建立算法以及相应的节点自学习算法.仿真实验表明我们的算法不仅取得了与MSKPD方案非常接近的抗毁损性能,而且在同样的预置和部署条件下,具有更高的密钥连通度. The trade-off between effectiveness and security of paiwise key establishment is the focus of paiwsie key management issue in wireless sensor networks. Vector-based key pre-distribution in extended modulus matrix is presented, along with corresponding node's self learning algorithm. Compared with MSKPD, experiments show that presented schemes achieve higher degree in key sharing graph with little expense on node's resistance, given the same condition of pre-distribution and deployment.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第4期792-796,共5页 Journal of Chinese Computer Systems
基金 国家自科基金项目(60773047)资助 国家"八六三"项目(2006AA01Z227)资助 湖南省教育厅优秀青年项目(06B005)资助
关键词 对偶密钥 传感器网络 预置矩阵 密钥连通图 pairwise key sensor network pre-distribution matrix key-sharing graph
  • 相关文献

参考文献6

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 3Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]. Proc. of the 9th ACM Conf. On Computer and Communications Security. Washington DC: ACM Press 2002, 41-47.
  • 4Blom R. An optimal class of symmetric key generation systems [C]. Advances in Cryptology, LNCS, Springer-Verlag 209, 1985,335-338.
  • 5Du W, Deng J, Han Y S, et al. A pairwise key pre-distribution scheme for wireless sensor networks [C]. Proceedings of the 10th ACM conference on Computer and communications security. Washington DC: ACM Press 2003,42-51.
  • 6Bela Bollobas. Modern graph thory[M]. New York: Springer-Verlag Inc, 2002.

二级参考文献34

  • 1Chong CY,Kumar SP.Sensor networks:Evolution,opportunities,and challenges.Proc.of the IEEE,2003,91(8):1247-1256.
  • 2Krishnamachari L,Estrin D,Wicker S.The impact of data aggregation in wireless sensor networks In:Proc.of the 22nd IEEE Int'l Conf.on Distributed Computing Systems Vienna:IEEE Computer Society,2002.575-578.
  • 3Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291http://www.jos.org.cn/1000-9825/14/1282.htm
  • 4Perrig A,Szewczyk R,Wen V,Culler D,Tygar JD.SPINS:Security protocols for sensor networks.In:Proc.of the 7th Annual Int'l Conf.on Mobile Computing and Networks.Rome ACM Press,2001.189-199.
  • 5The official website of the ZigBee alliances.http://www.zigbee.org
  • 6Doumit S,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks.MILCOM 2003-IEEE Military Communications Conf,2003,22(1):609-614.
  • 7Akyildiz IF,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor networks:A survey.Computer Networks,2002,38(4):393-422.
  • 8Huang Q,Cukier J,Kobayashi H,Liu BD,Zhang JY.Fast authenticated key establishment protocols for wireless sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.San Diego:ACM Press,2003.141-150.
  • 9Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security (CCS2003).Washington D.C.,2003.62-72.
  • 10Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,2003.197-213.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部