期刊文献+

无线传感器网络的组密钥更新算法 被引量:1

Group rekeying algorithm in wireless sensor networks
下载PDF
导出
摘要 提出了一种适用于无线传感器网络的基于改进密钥链接树的组密钥更新算法。通过在基于密钥链接树的组密钥管理方案中引入问题密钥路径,并延迟这些问题密钥路径上的密钥更新操作,从而减少密钥链接树中辅助节点上的重复密钥更新。实验结果表明,与现有的组密钥管理方案相比,基于改进密钥链接树的组密钥更新算法在节点添加和删除操作时产生更少的密钥更新消息和消耗更少的能量。 This paper proposed a refined key link-tree based group rekeying algorithm that is suitable for wireless sensor networks. By incorporating problem key paths into the key link tree-based group key management scheme and delaying the key update operations in problem key paths, the number of duplicate key update messages for auxiliary nodes could be reduced. The experimental results show the algorithm requires fewer rekeying messages and costs less power in the node adding and deleting operations than the existing group key management schemes.
出处 《计算机应用研究》 CSCD 北大核心 2010年第1期223-225,共3页 Application Research of Computers
基金 北京市自然科学基金资助项目(KZ200610005003)
关键词 无线传感器网络 组通信安全 组密钥更新 密钥链接树 wireless sensor networks group communication security group rekey key link-tree
  • 相关文献

参考文献6

  • 1RAFAELI S, HUTCHISON D. A survey of key management for secure group communication [ J ]. ACM Computing Surveys ,2003,35 (3) : 309- 329.
  • 2WONG C K, GOUDA M, LAM S S. Secure group communications using key graphs[ C]//Proc of ACM SIGCOMM'98. 1998.
  • 3WALDVOGEL M, CARONNI G, SUN Dan, et al. The versakey framework:versatile group key management [ J ]. IEEE Journal on Selected Areas in Communications, 1999,17 (9) : 1614-1631.
  • 4许勇,陈恺.安全多播中基于成员行为的LKH方法[J].软件学报,2005,16(4):601-608. 被引量:14
  • 5ZHANG Jun,ZHOU Yu, MA Fan-yuan,et al. An extension of secure group communication using key graph[J].Information Sciences, 2006,176 (20) :3060-3078.
  • 6GU Wen-jun,WANG Xun, CHELLAPPAN S, et al. Defending against search-based physical attacks in sensor networks [ C ]//Proc of the 2nd IEEE International Conference on Mobile Ad hoc and Sensor Systems. Washington DC : IEEE Press,2005:520-527.

二级参考文献8

  • 1Wong CK, Gouda M, Lam SS. Secure group communications using key graphs. IEEE/ACM Trans. on Networking, 2000,8(1):16-30.
  • 2Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures. RFC 2627, 1999.
  • 3Sherman AT, Mcgrew DA. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. on Software Engineering, 2003,29(5):444-458.
  • 4Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B. The versaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 1999,17(9): 1614-1631.
  • 5Rafaeli S, Mathy L, Hutchison D. LKH+2: An improvement on the LKH+ algorithm for removal operations. Internet draft (work in progress), Internet Eng. Task Force, 2002. http://www.watersprings.org/pub/id/draft-rafaeli-lkh2-00.txt.
  • 6Pegueroles J, Bin W, Soriano M, Rico-Novella F. Group rekeying algorithm using pseudo-random functions and modular reduction.Grid and Cooperative Computing (GCC), Lecture Notes in Computer Science, 2004,3032:875-882.
  • 7Pegueroles J, Rico-Novella F, Hernandez-Serrano J, Soriano M. Improved LKH for batch rekeying in multicast groups. In: Proc. of the IEEE Int'l Conf. on Information Technology Research and Education (ITRE 2003). New Jersey: IEEE Press, 2003. 269-273.
  • 8Selcuk AA, Sidhu D. Probabilistic optimization techniques for multicast key management. Computer Networks, 2002,40(2):219-234.

共引文献13

同被引文献12

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部