期刊文献+

一种改进的高效无线传感器网交叉加密方案 被引量:3

Efficient interleaved encryption scheme in wireless sensor networks
下载PDF
导出
摘要 无线传感器网中许多敏感、机密的数据需要加密保护。但受限于网络本身的特点,难以直接应用有线网中现有的安全技术,而需要更加高效的加密方式。在前人的基础上,改进并提出了一种新的加密方案。该方案基于对称密钥密码系统;网络中节点与其每个一、二跳邻节点分别共享一对密钥;传输数据时只用跟二跳邻节点的共享密钥加密,这样就构成了所谓的交叉加密。 For protecting the sensitive information in wireless sensor networks,it is essential to encrypt communications.However encryption is problematic since nodes have limited energy,CPU and memory capabilities.To overcome these shortcomings,a new encryption scheme is presented in this paper.It's called interleaved encryption,which has the form like a chain.And it's based on the symmetric key cryptosystem.Different from others,the encryption is not between two direct neighbours.Besides making communications more safe,the scheme has less operations of encryption and decryption.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第18期119-120,124,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60773083 广东省科技计划项目No.2006B15401002 广东省自然科学基金No.815106320100022 省部产学研项目(No.2008B090500201)~~
关键词 无线传感器网 对称加密 交叉加密 共享密钥 wireless sensor networks symmetric key cryptosystem interleaved encryption shared key
  • 相关文献

参考文献6

  • 1Castelluccia C.Authenticated interleaved encryption,Report 2006/ 416[R].Cryptology ePrint Archive,2006.
  • 2Castelluccia C,Securing very dynamic groups and data aggregation in wireless sensor networks[C]//IEEE Intematonal Conference on Mobile Adhoc and Sensor Systems,8-11 Oct 2007:1-9.
  • 3Castelluccia C,Mykletun E,Tsudik G.Efficient aggregation of encryption data in wireless sensor networks[C]//Mobile and Ubiquitous Systems : Networking and Services, 2005 : 109-117.
  • 4Kaskaloglu K,Kaya K,Selcuk A A.Threshold broadcast encryption with reduced complexity[C]//22nd International Symposium on computer and Information Sciences,Nov 2007:1-4.
  • 5Phong L T,Matsuoka V,Ogata W.Stateful identity-based encryption scheme:Faster encryption and decryption[C]//ASIAN ACM Symposium on Information,Computer and Communications Security,Tokyo, Japan.SESSION:Identity Based Encryption,2008:381-388.
  • 6Boldyreva A,Goyal V,Kumar V.Identity-based encryption with efficient revocation[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS' 08, October 27-31,2008.

同被引文献27

  • 1Agrawal R, Sriknat R. Privacy-preserving data mining [ C ]// Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 2000:439-450.
  • 2Huang Zhangli, Du Wenliang, Chen Biao. Deriving private information from randomized data[ C]//Proceedings of the ACM SIGMOD International Conferences on Management of Data (SIGMOD). 2005:37-48.
  • 3Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainly, Fuzziness and Knowledge-based Systems, 2002,10(5) :571-588.
  • 4Li N, Li T. T-closeness: Privacy beyond k-anonymity and 1-diversity [ C ]// Proceedings of the 23rd International Conference on Data Engineering ( ICDE). 2007 : 106-115.
  • 5Clifton C, Kantarcioglou M, Lin X, et al. Tools for Priva- cy-Preserving distributed data mining [ J ]. ACM SIGMOD Explorations, 2002,4 (2) :28-34.
  • 6Malin B, Airoldi E, Edoho-Eket S, et al. Configurable se- curity protocols for multi-party data analysis with malicious participants [ C]// Proceedings of the 21st International Conference on Data Engineering (ICDE). 2005:533-544.
  • 7Claude Castelluccia. Authenticated Interleaved Encryption [ R]. Cryptology Print Archive, Report 2006/416, 2006.
  • 8Claude Castelluccia. Securing very dynamic groups and da- ta aggregation in wireless sensor networks [ C ]// IEEE In- ternational Conference on Mobile Ad-hoc and Sensor Sys- tems. 2007,8 : 1-9.
  • 9Claude Castelluccia, Einar Mykletun, Gene Tsudik. Efficient aggregation of encryption data in wireless sensor networks [C]//IEEE International Conference on Mobile and Ubiqui- tous Systems : Networking and Services. 2005:109-117.
  • 10Kaskaloglu K, Selcuk A A. Threshold broadcast encryption with reduced complexity[ C ]//IEEE the 22nd Internation-al Symposium on Computer and Information Sciences. 2007 : 1-4.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部