期刊文献+

无线传感网络密钥管理及认证综述 被引量:2

Survey of Sensor Networks Key Management and Authentication
下载PDF
导出
摘要 无线传感器网络因其灵活性和适用性而广泛应用于民用、军用、商用等领域,然而由于传感器结点自身的特点使得无线传感器网络与传统网络有着很大的不同。对有安全性要求的无线传感器网络而言,若在敌对环境中使传感器网络结点间能安全地进行通信,密钥管理和认证就显得十分重要。目前针对密钥管理和认证提出了许多方案,对这些方案做出了总结并给出了比较,同时对进一步的研究方向进行了分析。 Because of the flexibility and extensive applicability of the wireless sensor networks, they can be applied into many fields such as civil, commercial and military. Based on nodes' characters, the sensor networks are quite different from the traditional networks. The key management and authentication are important to guarantee nodes' secure com- munication. Now there ' re many schemes for key management and authentication, in this paper the current schemes were classified and compared,also the future studying directions were pointed out.
出处 《计算机科学》 CSCD 北大核心 2010年第2期1-6,11,共7页 Computer Science
基金 国家博士后科研基金(20070410896) 黑龙江省博士后科研基金(LBH-206027)资助
关键词 无线传感器网络 密钥管理 认证 综述 WSN, Key management, Authentication, Survey
  • 相关文献

参考文献31

  • 1Shih E,Cho S,lckes N,et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks [C]//Christopher R, Mahmoud N, Michele Z, eds. Proc. of the 7th Annual Int' l Conf. on Mobile Computing and Networking (MobiCom 2001 ). Rome: ACM Press, 2001 : 272-287.
  • 2Akyildiz I F, Su W, ,Sankarsubramaniam Y, et al. Wireless Sensor Networks: a survey[J]. Computer Networks, 2002,38: 393- 422.
  • 3Wood A, Stankovie J. Denial of service in sensor networks[J]. IEEE Computer, 2002,35 (10) : 54-62.
  • 4Karlof C, Wagner D. Secure routing in wireless sensor net - works:attacks and countermeasures [C] // Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. 2003 : 113-127.
  • 5Newsome J,Shi E,Song D,et al. The sybil attack in sensor networks: Analysis and defenses[C]/,/Proceedings of the Third International Symposium on Information Processing in Sensor Networks. 2004:259-268.
  • 6邱慧敏.Sybil攻击原理和防御措施[J].计算机安全,2005(10):63-65. 被引量:6
  • 7Hu Yih-Chun, Perrig A, Johnson D B. Wormhole Attacks in Wireless Networks[J]. IEEE Journal on Selected Areas in Communications, 2006,2 (2) : 370-381.
  • 8Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures[J]. Elsevier's AdHoc Networks Journal,2003,1(2/3) :293-315.
  • 9苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 10Eschenauer L,Gligor V D. A key management scheme for dis- tributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. November 2002:41-47.

二级参考文献1

共引文献115

同被引文献29

  • 1马建庆,钟亦平,张世永.无线传感器网络密钥管理研究综述[J].仪器仪表学报,2006,27(z1):370-372. 被引量:1
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 3裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 4Estrin D, Govindan R, Heidemann J, et al. Next century challen- ges: scalable coordinate in sensor network[C]//Proe, of 5th ACM/IEEE Int' conf on Mobile Computing and Networking. Washington, USA: ACM Press, 1999 : 263-270.
  • 5Li Chang-le, Zhang Han-xiao, Hao Bin-bin, et al. A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks [J]. Sensors, 2011,11 (4) ~ 3498-3526.
  • 6Habermann A W. Dynamically Modifiable Distributed Systems [C] // Proc. of a Workshop on Distributed Sensor Nets, Pitts- burgh, Pennsylvania. Carnegie-Mellon University. 1978 : 111-114.
  • 7Hart C-C, Kumar R, Shea R, et at. Sensor Network Software Up- date Mana-gement: a Survey [J]. Intl. Journal of Network Mana- gement, John Wiley & Sons, 2005 (15) : 283-294.
  • 8Koshy J, Pandy R. Remote Incremental Linking for Energy-Effi- cient Reprogramming of Sensor Networks [C]//Proc. of the 2nd European Workshop on Wireless Sensor Networks ( EWSN ' 05). IEEE, 2005 : 354-365.
  • 9Reijers N, Langendoen K. Efficient Code Distribution in Wire- less Sensor Networks [C] // Proc. of the Second ACM Intl. Workshop on Wireless Sensor Networks and Applications(WS- NA'03). ACM, San Diego, CA, Sept. 2003 : 60-67.
  • 10Hui J ,Culler D. The Dynamic Behavior of a Data Dissemination Protoeol for Network Reprogramming at Scale[C] //Proe, of the 2nd international conference on Embedded Networked Sensor Systems. ACM, Baltimore, Maryland, USA, 2004: 81-94.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部