期刊文献+

无线传感器网络密钥管理 被引量:3

Key Management in Wireless Sensor Network
下载PDF
导出
摘要 无线传感器网络密钥管理极具挑战性,不仅因为传感器节点拥有的资源有限,不宜采用非对称密码技术,同时也因为传感器节点暴露在恶劣甚至敌对环境中,易于被敌手俘获。虽然目前提出许多密钥分配协议,但没有一个协议能在扩展性、共享密钥概率、存储代价和抵御节点俘获攻击等方面同时具有良好性能。密钥管理协议采用的技术必须与具体网络需求和传感器节点拥有的资源一致。分析和评估了典型的密钥管理方案和协议,并指出了该方向存在的开放问题及今后的发展趋势。 Key management in wireless sensor network is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. Even though a number of key distribution protocols have been proposed, none of them can simultaneously achieve good performance in terms of scalability in network size,key sharing probability between neighboring sensors,memory overhead for keying information storage, and resilience against node capture attacks. The techniques employed must depend upon the requirements of target applications and resources of each individual sensor network. In this paper, several key management schemes and protocols are discussed and evaluated in detail,and finally the open research problems and the possible trends in this field are also pointed out.
作者 魏伟 刘志宏
出处 《现代电子技术》 2009年第21期86-92,共7页 Modern Electronics Technique
关键词 无线传感器网络 密钥管理 密钥预分配 安全 wireless sensor network key management key pre - distribution security
  • 相关文献

参考文献27

  • 1Giruka V C,Singhal M,Royalty J,et al. Security in Wireless Sensor Networks [J]. Journal of Wireless Communications and Mobile Computing, 8 (2008) : 1 - 24,2008.
  • 2Xiao Y,Rayi V K,Sun B,et al. A Suvery of Key Management Schemes in Wireless Sensor Networks[J]. Journal of Computer Communications, 2007 : 2 314 - 2 341.
  • 3Johnson C Lee,Victor C M Leung,Kirk H Wong,etal. Key Management Issues in Wireless Sensor Networks: Current Protocols and Future Developments[J]. IEEE Wireless Communications, 2007 : 76 - 84.
  • 4Sergio Barbarossa, Gesualdo Scutari. Bio- Inspired Sensor Network Design - Distributed Deseisions through Self - Synchronization [J]. IEEE Signal Processing Magazine, 2007 : 26 - 35.
  • 5Anderson R, Chan H, Perrig A. Key Infection.. Smart Trust for Smart Dus[A]. ICNP'04[C]. Berlin, Germany, 2004.
  • 6Liu Z, Ma J, Huang Q,et al. Key Infection and Evolution for Sensor Networks[R]. Technical Report #23, Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University,China, 2008.
  • 7Liu D, Ning P. Establishing Pairwise Keys in Distributed Sensor Networks[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security [C]. Washington D C, 2003 : 52 - 61.
  • 8Traynor P, Kumar R, Choi H, et al. Porta, Efficient Hybird Security Mechanisms for Heterogeneous Sensor Networks [J]. IEEE Trans. on Moblie Computing, 2007,6(6) : 663 - 677.
  • 9Jolly G,Kusu M,Kokate P. A Hicrarchical Key Management Method for Low - energy-Wireless Sensor Networks [A]. Proceedings of the 8th IEEE Symposium on Computers and Communication[C]. Turkey, 2003 : 335 - 340.
  • 10Du X,Xiao Y,Guizani M,et al. An Efficient Key Management Scheme for Heterogeneous Sensor Networks[J]. Ad Hoc Networks, 2007,5(1) :24 - 34.

同被引文献21

  • 1马建庆,钟亦平,张世永.无线传感器网络密钥管理研究综述[J].仪器仪表学报,2006,27(z1):370-372. 被引量:1
  • 2谭利平,李方伟.移动通信系统中的认证与密钥协商协议[J].计算机应用,2007,27(6):1343-1344. 被引量:5
  • 3严军,徐红兵.一种基于随机密钥的无线传感器网络加密方案[J].现代电子技术,2007,30(12):45-48. 被引量:1
  • 4MaoWen-bo.现代密码学理论与实践[M].北京:电子工业出版社,2004:169-171.
  • 5FUMY W,LANDROCK P.Principles of key management[J].IEEE Journal on Selected Areas in Communications,1993,11:785-793.
  • 6KWAK D W,LEE S,KIM J,et al.An efficient key tree management algorithm for l KH group key management[C]//Proceedings of International Conference on Information Networking.Sendal,Japan:ICIN,2006:703-712.
  • 7FIRDOUS Kausar,SAJID Hussain,YANG T L,et al.Sealable and efficient key management for heterogeneous sensor networks[J].The Journal of Supercomputing,2008,45(1):44-65.
  • 8MuHAMMAD K R R S,LEE H,LEE S,et al.MUQAMI+:a scalable and locally distributed key management scheme for clustered sensor networks[J].Annals of Telecommunications,2009,65(1/2):101-116.
  • 9CHUNG Y F,CHEN T S,HO C C,et al.Hierarchical time-bound key management for mobile agents[C]//Proceedings of International Conference on Algorithms and Architectures for Parallel Processing.Taipei,China:ICAAPP,2009:242-253.
  • 10WANG K,ZHAO Z W,YAO L.An agile reconfigurable key distribution scheme in space information network[C]//Proceedings of the Second IEEE Conference on Industrial Electronics and Applications.Harbin,China:IEEE Press,2007:2742-2747.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部