期刊文献+

An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks 被引量:2

An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks
下载PDF
导出
摘要 Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subject to node capture.Constrained energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network.In this paper,an authenticated dynamic key management scheme,ADKM has been proposed.It provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes.ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication.Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks. Secure sensor networks has received much attention in the last few years. A sensor network always works unattended possibly in a hostile environment such as a battlefield. In such environments, sensor networks are subject to node capture. Constrained energy, memory, and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network. In this paper, an authenticated dynamic key management scheme, ADKM has been proposed. It provides efficient, scalable, and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes. ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks.
出处 《China Communications》 SCIE CSCD 2010年第4期7-17,共11页 中国通信(英文版)
基金 The work reported in this paper was supported by the National Natural Science Foundation of China under Grant No. 60972077, the National High-Tech Research and Development Plan of China under Grant No. 2009AA01 Z430, the Beijing Municipal Natural Science Foundation under Grant No. 9092009, the Fundamental Research Funds for the Central Universities under Grant No. B 1020211, China Postdoctoral Science Foundation funded project under Grant No. 20100471373, the "Six Talent Peaks Program" of Jiangsu Province of China and Program for New Century Excellent Talents in Hohai University.
关键词 通信技术 安全传感器 通信安全 节点 Wireless Sensor Networks Key Management Exclusion Basis Systems One-way Hash Chain
  • 相关文献

参考文献22

  • 1Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks[J]. Computer Communications, 2006, 29, 216-230.
  • 2Xiao Y, et al..A survey of key management schemes in wireless sensor networks[J]. Computer Communications, 2007, 30, 2314-2341.
  • 3Kuldeep R. Garimella.Distributed key management for wireless sensor networks[C] Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks,2009: 23-28.
  • 4Choa J H, Chena I R, Wang D C. Performance optimization of region-based group key management in mobile ad hoe networks[J]. Performance Evaluation, 2008, 65:319-344.
  • 5苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 6Wander A S, Gura N, Eberle H, et. al. Energy Analysis of Public- Key Cryptography for Wireless Sensor Networks[C]//Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), 2005: 324-328.
  • 7Gaubatz G, Kaps J, Sunar B. Public Key Cryptography in Sensor Networks-Revisited[J]. Lecture Notes in Computer Science, 2004, 3313: 2-18.
  • 8Naureen A, Akram A, Riaz R, et al. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks[J]. Lecture Notes in Computer Science, 2009, 5576: 629-701.
  • 9Riaz R, Naureen A, Akram A. et al. A unified security framework with three key management schemes for wireless sensor networks[J]. Computer Communications, 2008, 31: 4269-4280.
  • 10Syed M, Lee H, Lee S, et al. MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks[J]. Annales des Telecommunications, 2010, 65(1-2): 101-116.

二级参考文献2

共引文献116

同被引文献31

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部