期刊文献+

基于区域的异构无线传感器网络密钥管理 被引量:9

Domain-based key management for heterogeneous wireless sensor networks
下载PDF
导出
摘要 密钥管理是无线传感器网络中极具挑战性的安全问题之一。在随机密钥预分配方案的基础上,提出一种利用节点部署知识和已知区域信息的异构无线传感器网络密钥预分配方案,并分别从网络连通性、节点内存需求和安全性等方面对方案进行性能评价和模拟仿真。结果表明,相比现有密钥管理方案,本方案能提高网络的连通性,减小节点所需存储空间,并增强网络抗攻击能力。 Key management was one of the most challenging security problems in wireless sensor networks. Based on the random key pre-distribution scheme, a new scheme was proposed for heterogeneous wireless sensor networks using deployment knowledge of the node and the prior area deployment information. The performance evaluation and security analysis show that compared with existing key management schemes, the key management scheme can substantially im- prove a network's connectivity with low complexity, significantly reduce the storage requirement and enhance the net- work resilience against node capture.
出处 《通信学报》 EI CSCD 北大核心 2009年第5期74-81,共8页 Journal on Communications
基金 国家自然科学基金资助项目(90718003) 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z401) 国家博士后科学基金资助项目(20070410896) 黑龙江省博士后科研启动基金资助项目(LBH-Z06027) 哈尔滨工程大学基础研究基金资助项目(HEUFT05067)~~
关键词 异构无线传感器网络 密钥管理 密钥预分配 安全 heterogeneous wireless sensor networks key management key pre-distribution security
  • 相关文献

参考文献17

  • 1CARMAN D W, KRUUS P S, MATT B J. Constraints and Approaches for Distributed Sensor Network Security[R]. NAI LABS Technical Report #00-010, 2000.
  • 2ESCHENAUER L, GLIGOR V. A key management scheme for distributed sensor networks[A]. Proceedings of the 9th ACM Conference on Computer and Communication Security[C]. Washington, DC, USA, 2002. 41-47.
  • 3CHAN H, PEP, RIG A, SONG D. Random key pre-distribution schemes for sensor networks[A]. Proceedings of Symposium on Research in Security and Privacy[C]. Oakland, USA, 2003. 197-213.
  • 4REN K, ZENG K, LOU W. A new approach for random key pre-distribution in large-scale wireless sensor networks[J]. Journal of Wireless Communication and Mobile Computing (Special Issue on Wireless Networks Security), 2006, 3 (6): 307-318.
  • 5DU W, DENG J, HAN Y. A pairwise key predistribution scheme for wireless sensor networks[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington, DC, USA, 2003.42-51.
  • 6LIU D, NING E Establishing pairwise keys in distributed sensor networks[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington, DC, USA, 2003. 52-61.
  • 7LIU D, NING P. Location-based pairwise key establishments for static sensor networks[A]. Proceedings of SASN'03 [C]. Fairfax, USA, 2003. 72-82.
  • 8DU W, DENG J, HAN Y. A key management scheme for wireless sensor networks using deployment knowledge[A]. Proceedings of IEEE INFOCOM'04[C]. Hong Kong, China, 2004. 586-597.
  • 9LIU E RIVERA M, CHENG X. Location-aware key establishment in wireless sensor networks[A]. Proceedings of IWCMC'06[C]. Vancouver, Canada, 2006.21-26.
  • 10刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理[J].计算机学报,2006,29(9):1608-1616. 被引量:27

二级参考文献9

  • 1Carman D. W. , Kruus P. S. , Matt B.J.. Constraints and approaches for distributed sensor security. NAI Labs Technical Report #00-010, 2000
  • 2Neuman B, C. , Tso T.. Kerberos: An authentication service for computer networks. IEEE Communications, 1994, 32 (9) :33-38
  • 3Eschenauer L. , Gligor V. D.. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002, 41-47
  • 4Chan H. , Perrig A. , Song D.. Random key predistribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, California, 2003,197-213
  • 5Do Wen-Liang, Deng Jing ,Han Y. S. ,Chen Shi Gang, Varshney P. K.. A pairwise key pre-distribution scheme for wireless sensor networks. In.- Proceedings of the 10th ACM Conference on Computer and Communications Security(CCS), Washington,DC, USA, 2003, 42-51
  • 6Du Wen-Liang, Deng Jing, Han Y. S. , Chen Shi-Gang, Varshhey P. K: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of the IN-FOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004, 1: 586-597
  • 7Chan A. C-F.. Distributed symmetric key management for mobile Ad Hoc networks. In: Proceedings of the INFOCOM 2004,Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004, 4 : 2414 -2424
  • 8Meguerdichian S, , Slijepcevic S. , Karayan V. , Potkonjak M..Localized algorithms in wireless ad hoc networks: Location discovery and sensor exposure. In: Proceedings of the ACM MOBICOM, Long Beach, CA, 2001, 106-116
  • 9Ungrangsi R.. Location detection in emergency sensor networks using robust identifying codes [ M. S. dissertation]. Boston,MA: Boston University, 2003

共引文献26

同被引文献94

引证文献9

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部