期刊文献+

无线传感器网络中滑动窗口自愈的密钥分发机制 被引量:1

Sliding-window self-healing key distribution mechanism for WSN
下载PDF
导出
摘要 基于双向散列链的自愈组密钥分发机制存储、通信和计算效率高,但易遭受敌方的合谋攻击。针对这一问题,提出了滑动窗口自愈的密钥分发机制。采用带密钥的双向散列链,引入自愈密钥参与会话密钥的计算。通过滑动窗口控制自愈区间,减少了密钥暴露,实现了抗区间合谋攻击的能力。相关分析和仿真结果表明,相比于前人的工作,该方法在保证效率的前提下,大大降低了合谋风险,有效地提高了安全性。 Self-healing group key distribution mechanism based on dual direction hash chain has received extensive attention for its property advantages of high performance in terms of storage, communication and computation complexity. However, it is usually vulnerable to collusive attack from its adversaries. This paper presented a sliding-window self-healing key distribution mechanism for the collusion problem. It used the hash function with a key to form dual directional hash chain. The self-healing key took part in the computing of the corresponding session key. By using a sliding-window, limited the self-healing interval to a certain range, which reduced the exposure of keys and achieved the capability of resisting collusion attack from nodes lying outside the self-healing interval. Correlation analysis and simulation results show that compared with the former works, the key distribution mechanism greatly lower the risk of collusion attack and effectively improves security under the same efficiency level.
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期338-340,351,共4页 Application Research of Computers
关键词 无线传感器网络 组通信 密钥分发 滑动窗口自愈 合谋攻击 wireless sensor network (WSN) group communication key distribution sliding-window self-healing collusionattack
  • 相关文献

参考文献11

  • 1STADDON J, MINER S, FRANKLIN M, et al.Self-healing key distribution with revocation[C]//Proc of the 2002 IEEE Symposium on Research in Security and Privacy(S&P’02).[S.l.]: IEEE Press, 2002:241-257.
  • 2LIU D G, NING P, SUN K.Efficient self-healing group key distribution with revocation capability[C]//Proc of the 10th ACM Conference on Computer and Communications Security.Washington DC:ACM Press,2003:231-240.
  • 3BLUNDO C, D’ARCO P, LISTO M.Design of self-healing key distribution schemes[J].Designs, Codes and Cryptography,2004,32(1-2):15-44.
  • 4DUTTA R, MUKHOPADHYAY S.Designing scalable self-healing key distribution schemes with revocation capability[C]//Proc of ISPA2007.[S.l.]: Springer-Verlag,2007:419-430.
  • 5DUTTA R, WU Y D, MUKHOPADHYAY S.Constant storage self-healing key distribution with revocation in wireless sensor network[C]//Proc of ICC’07.2007:1323-1328.
  • 6DUTTA R, MUKHOPADHYAY S.Improved self-healing key distribution with revocation in wireless sensor network[C]//Proc of 2007 IEEE Wireless Communications and Networking Conference.[S.l.]:IEEE Press, 2007:2965-2970.
  • 7MORE S M, MALKIN M, STADDON J, et al.Sliding-window self-healing key distribution[C]//Proc of the ACM Workshop on Survivable and Self-Regenerative Systems (In Association with the 10th ACM Conference on Computer Communications Security).[S.l.]:ACM Press,2003:82-90.
  • 8DUTTA R, CHANG E C, MUKHOPADHYAY S.Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains[C]//Proc of ACNS.[S.l.]:Springer-Verlag,2007:385-400.
  • 9JIANG Y X, LIN C, SHI M H, et al.Self-healing group key distribution with time-limited node revocation for wireless sensor networks[J].Ad hoc Networks,2007,5(1):14-23.
  • 10杜春来,胡铭曾,张宏莉,张冬艳.基于双向散列链具有撤销能力的自愈组密钥分发机制[J].通信学报,2009,30(6):33-37. 被引量:5

二级参考文献28

  • 1胡华平,胡光明,董攀,陈新.大规模移动自组网络安全技术综述[J].计算机研究与发展,2007,44(4):545-552. 被引量:13
  • 2STADDON J, MINER S, FRANKLIN M, et al. Self-healing key distribution with revocation[A]. Proceedings of the 2002 IEEE Symposium on Research in Security and Privacy (S&P'02)[C]. Berkeley, CA, 2002. 241-257.
  • 3LIU D G, NING P, SUN K. Efficient self-healing group key distribution with revocation capability[A]. Proceedings of the 10th ACM Conference on Computer and 2003)[C]. Washington, DC, United Communications Security (CCS States, 2003.231-240.
  • 4BLUNDO C, D'ARCO P, LISTO M. A new self-healing key distribution scheme[A]. Proceedings of the 8th IEEE Symposium on Computers and Communications (ISCC'2003)[C]. Antalya, Turkey, 2003. 803-808.
  • 5BLUNDO C, D'ARCO P, LISTO M. Design of self-healing key distribution schemes [J]. Designs, Codes and Cryptography. 2004, 32(1-2): 15-44.
  • 6BLUNDO C, D'ARCO P, DE S A. On self-healing key distribution schemes[J]. IEEE Transactions on information Theory, 2006, 52(12) :5455-5467.
  • 7HONG D, KANG J S. Art efficient key distribution scheme with self-healing property[J]. IEEE Communications Letters, 2005, 9(8): 759-761.
  • 8SAEZ G, On threshold self-healing key distribution schemes[A]. Proceedings of Cryptography and Coding 2005[C]. Cirencester, United Kingdom, 2005. 340-354.
  • 9SAEZ G. Self-healing key distribution schemes with sponsorization[A]. Proceedings of CMS 2005[C]. Salzburg, Austria, 2005.22-31.
  • 10ZOU X K, DAI Y S. A Robust and Stateless self-healing group key management scheme[A]. Proceedings of ICCT '06[C]. Guilin, China,2006. 1-4.

共引文献12

同被引文献12

  • 1STADDON J, MINER S, FRANKLIN M, et al. Self-healing key distribution with revocation [ C]//Proc of IEEE Symposium on Security and Privacy. [S. 1. ] : IEEE Press,2002:241-257.
  • 2LIU Dong-gang,NING Peng, SUN Kun. Efficient self-healing group key distribution with revocation capability [ C ] //Proc of the 10th ACM Conference on Computer and Communications Security. New York: ACM Press, 2003:231-240.
  • 3BLUNDO C, D’ ARCO P, De SANTIS A. On self-healing key distribution schemes[J]. IEEE Trans on information Theory,2006,52(12) :5455-5467.
  • 4DUTTA R, MUKHOPADHYAY S, DDOWLING T. Generalized self-healing key distribution in wireless Ad hoc networks with trade-offs in user ’ s pre-arranged life cycle and collusion resistance [ C ] //Proc of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks. New York: ACM Press, 2009:80-87.
  • 5TIAN Bi-ming, HAN Song, DILLON T S. A self-healing key distribution scheme based on vector space secret sharing and one way hash chains [ C ] //Proc of International Symposium on a World of Wireless, Mobile and Multimedia Networks. Washington DC : IEEE Computer Society ,2008 : 1-6.
  • 6TIAN Bi-ming, HAN Song, PARVIN S,et al. Self-healing key dis-tribution schemes for wireless networks: a survey[ J]. The ComputerJournal,2011,54(4) :549-569.
  • 7PARK C, HUR J, KWEON K,et al. Self-healing key distribution scheme with long service time [ J ]. IEICE Electronics Express, 2010,7(13) :913-919.
  • 8TIAN Bi-ming, HAN Song, DILLON T S. A self-healing and mutual-healing key distribution scheme based on bilinear pairings[ C ]//Proc of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Washington DC :IEEE Computer Soiety, 2008 : 208 -215.
  • 9JIANG Yi-xin, LIN Chuang, SHI Ming-hui, et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks[ J]. Ad Hoc Networks,2007,5(1) :14-23.
  • 10DUTTA R,MUKHOPADHYAY S, COLLIER M. Computationally secure self-healing key distribution with revocation in wireless and Ad hoc networks[ J]. Ad Hoc Networks,2010,8( 1) :597-613.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部