期刊文献+

基于中国剩余定理的传感器网络簇内密钥共享 被引量:1

Key Sharing in Hierarchical Sensor Networks Based on Chinese Remainder Theorem
下载PDF
导出
摘要 针对层次型无线传感器网络,提出一种新颖的密钥共享方案,利用中国剩余定理来解决簇头与簇成员之间的共享密钥对建立问题.通过实验与理论分析证明,该方案与其它方案相比具有以下优点:1)存储最优,只要求每个传感器节点存储2个密钥,且存储开销与网络规模无关;2)网络全连通,任何一对簇头-簇成员节点都能够建立1个全网唯一的共享密钥;3)计算开销和通信开销低;4)网络能够抵抗物理捕获节点攻击和共谋攻击. A novel key agreement is proposed for a three-tier hierarchical wireless sensor network.It employs Chinese remainder theorem to establish the pairwise key between a node and its cluster head.Compared with existing key management schemes,it has a lot of good properties.First,it is optimal in saving sensor node′s storage;each node only stores two keys,which is independent from the network size.Second,the network is wholly connected,and each pair neighboring nodes can set up a unique pairwise key.Third,it requires low computation and communication overhead over the whole network.And lastly,it is resilient against the node capture attack and collusion attack.
作者 柳亚男 王箭
出处 《南通大学学报(自然科学版)》 CAS 2010年第3期1-8,共8页 Journal of Nantong University(Natural Science Edition) 
基金 国家高技术研究发展计划(863计划)项目(2009AA044601)
关键词 共享密钥对 密钥协商 中国剩余定理 层次型无线传感器网络 pairwise key key sharing Chinese remainder theorem hierarchical wireless sensor network
  • 相关文献

参考文献13

  • 1Akyildiz F,Su W,Sankarasubramanian Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38 (4):393-422.
  • 2Carman D W,Kruus P S,Matt B J.Constraints and approaches for distributed sensor networks security[R].Technical Report 00-010,NAI labs,2000.
  • 3Perrig A,Stankovic J,Wagner D.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57.
  • 4Park T,Shin K G.Secure routing based on distributed key sharing in large-scale sensor networks[J].ACM Transactions on Embedded Computing Systems,2008,7(2):Article20.
  • 5Ren J,Li Y,Li T T.Routing-based source-location privacy in wireless sensor networks[C] //Proceedings of IEEE ICC 2009,Dresden,Germany,2009:620-624.
  • 6Gupta G,Younis M.Performance evaluation of load-balanced clustering of wireless sensor networks[C] //Proceedings of the 10th International Conference on Telecommunications.Tahiti,Papeete-French Polynesia,2003:1577-1583.
  • 7Blundo C,Santis A D,Herzberg A,et al.Perfectly-secure key distribution for dynamic conferences[C] //Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology.London:Springer,1992:471-486.
  • 8Jolly G,Kuscu M C,Kokate P,et al.A low-energy key management protocol for wireless sensor networks[C] //Proceedings of the Eighth IEEE International Symposium on Computers and Communications.Washington,D.C.,USA:IEEE,2003:335-340.
  • 9Du X J,Xiao Y,Guizani M,et al.An effective key management scheme for heterogeneous sensor networks[J].Ad Hoc Networks,2007,5 (1):24-34.
  • 10Boujelben M,Cbeikhrouhou O,Abid M,et al.Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks[C] //Proceeding of 3rd International Conference on Sensor Technologies and Applications.Washington,D C,USA:IEEE,2009:442-448.

同被引文献16

  • 1Akyildiz I, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: a survey[J]. Computer Networks, 2002,38(4):393- 422.
  • 2Carman D, Kruus P, Matt B. Constraints and approaches for distributed sensor network security (final) [R]. NAI Technical Report, 2000 : 1 - 139.
  • 3Perrig A, Stankovic J. Security in wireless sensor networks[J]. Communications of the ACM, 2004,47 (6) : 53 - 57.
  • 4Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//Proc, of the 9th A CM Confer ence on Computer and Communications Security, 2002: 41 - 47.
  • 5Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks[C]//Proc, of the IEEE Symposium on Security and Privacy, 2003 : 197 - 213.
  • 6Gupta G, Younis M. Performance evaluation of load-balanced clustering of wireless sensor networks[C] // Proc. of the 10th Internation al Conference on Telecommunications ,2003:1577 - 1583.
  • 7Blundo C, Santis A D, Herzberg A, et al. Perfectly secure key distribution for dynamic conferences[J]. Information and Computation,1998,146(1) :1 - 23.
  • 8Jolly G, Kuscu M, Kokate P, et al. A low-energy key management protocol for wireless sensor networks[C]// Proe. of the 8th IEEE Symposium on Computers and Communications, 2003 :335 - 340.
  • 9Boujelben M, Cheikhrouhou O, ANd M, et al. Establishing pairwise keys in heterogeneous two-tiered wireless sensor networksEC]//Proc. of the 3rd International Conference on Sensor Technologies and Applications, 2009 : 442 - 448.
  • 10Du X, Xiao Y, Guizani M, et al An effective key management scheme for heterogeneous sensor networks[J]. Ad Hoc Netzvorks, 2007,5(1) :24 - 34.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部