期刊文献+

WSNs中多项式密钥预分配改进方案 被引量:3

Improved Scheme of Polynomial Key Pre-distribution in Wireless Sensor Networks
下载PDF
导出
摘要 针对密钥管理与路由信息脱离的现象,提出一种基于按需路由协议的多项式密钥预分配改进方案。该方案利用网络路由的拓扑信息和基站功能,使基站集中存储重要安全信息并承担大量计算负荷,普通节点仅保存其邻居的多项式份额。该机制能有效防止密钥泄漏,增强网络的安全性,节省节点的能量资源。 To solve the limitation of combination between traditional key management and routing information, this paper presents an improved scheme of polynomial key pre-distribution based on on-demand routing protocol according to the security requirement. The scheme makes full use of the topology information of routing and the function of the base station, which gathers the important security information and the computing loads, to insure the sensor only stores the polynomial quantum of neighbors. The mechanism can effectively prevent the key from giving away, improves the network secure performance, and save the energy resource.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第18期139-141,共3页 Computer Engineering
基金 教育部基金资助重点项目(104086)
关键词 无线传感器网络 网络安全 密钥预分配 多项式份额 Wireless Sensor Network(WSN) network security key pre-distribution polynomial quantum
  • 相关文献

参考文献5

  • 1Adrian P, John S, David W. Security in Wireless Sensor Networks[J]. Communication ACM, 2004, 47(4): 53-57.
  • 2Akkaya K, Younis M. A Survey on Routing Protocols for Wireless Sensor Networks[J]. Ad Hoc Networks, 2005, 3(3): 325-349.
  • 3Eschenauer L, Gligor V D. A Key-management Scheme for Distributed Sensor Networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, DC, USA: ACM Press, 2002.
  • 4Haowen C, Perrig A, Dawn S. Random Key Pre-distribution Schemes for Sensor Networks[C]//Proceedings of IEEE Symposium on Security and Privacy. Berkeley, California, USA: IEEE Press, 2003.
  • 5Didier F, Yann L C. Finding Low-weight Polynomial Multiples Using Discrete Logarithm[C]//Proc. of IEEE International Symposium on Information Theory. Nice, France: IEEE Press, 2007.

同被引文献17

  • 1ESCHENAUER L, GLIGOR V D. A Key Management Scheme for Distributed Sensor network[C]//Proceedings of the 9'h ACM Conference on Computer and Communication Security.[s.l.]: ACM, 2002: 41-47.
  • 2CHAN H, PERRIG A, SONG D. Random Key Predistribution Schemes for Sensor Networks[C]//Proceedings of the 2003 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2003 : 197-213.
  • 3LIU D, NING P. Location--Based Pairwise Key Establishments for Static Sensornetworks[C]//Proceedings of the 1~' ACM Workshop on Security of Ad Hocand Sensor Networks. New York: ACM Press, 2003: 72-82.
  • 4BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly Secure Key Distribution for Dynamic Conferences[J]. Information andComputation, 1998, 146(1): 1-23.
  • 5DIDIER F, YANN L C. Finding Low-weight Polynomial Multiples Using Discrete Logarithm[C]//Proc.of IEEE International Symposium On Information Theory. France: IEEE Press, 2007.
  • 6TIEN-DUNG N, AYMEN A S, EUI-NAM H. A Dynamic ID-based Authentication Scheme[C]/fNetworked Computing and Advanced Information Management(NCM), 2010 Sixth International Conference on Seoul. Korea(South): [s.n.], 2010: 248-253.
  • 7李军,李录明.多项式密钥预分配协议在传感器网络上的实现[J].计算机工程,2007,33(15):149-151. 被引量:3
  • 8杨跃,王福豹,段渭军.无线传感器网络安全定位研究[J].信息安全与通信保密,2008,30(9):56-60. 被引量:10
  • 9许金红,王伟平.WSN中典型的攻击模型与安全策略研究[J].通信技术,2009,42(12):90-91. 被引量:2
  • 10范波,苗伟.无线传感器网络及其在环境监测应用概况[J].通信技术,2009,42(12):170-172. 被引量:7

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部