期刊文献+

传感器网络中基于信誉模型的对偶密钥建立算法 被引量:1

Reputation model based pair-wise key establishment algorithm for sensor networks
下载PDF
导出
摘要 基于密钥预置技术,提出了一种新的传感器网络动态对偶密钥建立算法。在该算法中,节点在部署前首先被预置一个全局初始密钥,在部署之后,邻节点之间将基于预置的全局初始密钥来动态生成一跳的对偶密钥。理论分析与实验结果表明,与已有基于随机方法的传感器网络对偶密钥建立算法相比,新算法具有更好的直接和间接对偶密钥建立概率。 Based on the key pre-distribution scheme,a new pair-wise key establishment method was proposed for sensor networks,in which each node was pre-assigned with an initial global key before deployment.And after deployment,the node can dynamically establish different one-hop pair-wise key on the basis of the pre-assigned global initial key.The theoretical analysis and simulation results show that the new algorithm has better probability of direct and indirect pair-wise key establishment than the traditional random pair-wise key establishing scheme for sensor networks.
作者 成奋华
出处 《计算机应用》 CSCD 北大核心 2011年第7期1876-1879,共4页 journal of Computer Applications
关键词 对偶密钥 传感器网络 网络安全 信誉模型 pair-wise key sensor network network security reputation model
  • 相关文献

参考文献8

  • 1POTTIE G, KAISER W. Wireless sensor networks[J]. Communications of the ACM, 2000, 43(5): 51-58.
  • 2成奋华,周顺先,王雷.传感器网络中基于对偶编码的随机密钥建立算法[J].计算机应用,2010,30(6):1495-1497. 被引量:4
  • 3WEI REIZHONG, WU JIANG. Product construction of key distribution schemes for network[C] // Proceedings of ACM SIG Symposium on Applied Computing. New York: ACM, 2005, 3357: 280-293.
  • 4SHEU J P, CHENG J C. Pair-wise path key establishment in wireless sensor networks[J].Computer Communications,2007,30(11/12):2365-2374.
  • 5EESCHNAURE L, GLIGOR V D. A key-management scheme for distributed sensor networks[C] // Proceedings of the 9th ACM Conference on Computer and Communication Security. New York: ACM,2002:41-47.
  • 6CHAN HAOWEN, OERRIG A, SONG D. Random key predistribution schemes for sensor networks[C] // IEEE Symposium on Research in Security and Privacy. Washington, DC: IEEE Computer Society, 2003:197-213.
  • 7LIU DONGGUANG, NING PENG. Establishing pairwise keys in distributed sensor networks[J]. ACM Transactions on Information and System Security, 2005, 8(1):41-77.
  • 8王雷,林亚平,陈治平,文学.基于极大安全通路向量的超立方体容错路由[J].通信学报,2004,25(4):130-137. 被引量:11

二级参考文献14

  • 1WANG G,CHO G.Compromise-resistant pairwise key establishments for mobile Ad Hoc networks[J].ETRI Journal,2006,28(3):375-378.
  • 2POTTIE G,KAISER W.Wireless sensor networks[J].Communications of the ACM,2000,43(5):51 -58.
  • 3ESTRIN D,GOVINDAN R,HEIDEMAN J,et al.Next century challenges:Scalable coordination in sensor networks[C]// Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking.New York:ACM Press,1999:263 -270.
  • 4AKYILDLZ I F,SU W,SANKARASUBRAMANIAM Y,et al.A survey on sensor networks[J].IEEE Communications Magazine,2002,40(11):102-114.
  • 5EESCHNAURE L,GLIGOR V D.A key-management scheme for distributed sensor networks[C]// Proceedings of the 9th ACM Conference on Computer and Communication Security.New York:ACM press,2002:41 -47.
  • 6CHAN H,OERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]// Proceedings of IEEE Symposium on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,2003:197-213.
  • 7BLUNDO C,DESANTIS A,KUTTEN S,et al.Perfectly secure key distribution for dynamic conferences[C]// Proceedings of the Advances in Cryptology.Berlin:Springer-Verlag,1993:471 -486.
  • 8LIU DONGGANG,NING PENG,LI RONGFANG.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2004,20(10):1-35.
  • 9蔡立军,王雷,林亚平,李小龙.传感器网络中基于DNA模型的对偶密钥建立算法研究[J].电子学报,2008,36(1):171-176. 被引量:2
  • 10胡宇舟,王雷,陈治平,顾学道.传感器网络中对偶密钥的动态密钥路径建立机制及算法[J].通信学报,2008,29(2):52-58. 被引量:7

共引文献13

同被引文献14

  • 1兰海兵,程胜利.RSA算法及其实现技术的改进研究[J].交通与计算机,2006,24(1):95-97. 被引量:4
  • 2鄢喜爱,杨金民,田华.RSA公钥密码算法的分析[J].长春工业大学学报,2006,27(2):142-144. 被引量:7
  • 3何文才,牛晓蕾,刘培鹤,杜鹏,张媛媛.密码算法RC5和RC6的分析和比较[J].网络安全技术与应用,2007(2):28-30. 被引量:3
  • 4王琴琴,陈相宁.Montgomery算法在RSA中的应用及其优化[J].计算机技术与发展,2007,17(6):145-146. 被引量:7
  • 5冯登国 周永彬 张振峰 译.密码工程实践指南[M].北京:清华大学出版社,2001..
  • 6STALLINGSW.密码编码学与网络安全--原理与实践[M].4版.北京:电子工业出版社,2006.
  • 7阙喜戎,孙悦,龚向阳,等.信息安全原理及应用[M].北京:清华大学出版社,2005.
  • 8SINHA A, CHANDRAKASAN A, MIT C. Dynamic power man- agement in wireless sensor networks[ J]. IEEE Design & Test of Computer, 2001, 18(2) : 62 -74.
  • 9PERING T, BURD T, BRODERSEN R. Dynamic voltage scaling and the design of a low-power microprocessor system [ C ]// ISCA1998: International Symposium on Computer Architecture. Piscataway: IEEE Press, 1998:17 -22.
  • 10HUI J, AIDA H. A cooperative game theoretic approach to cluste- ring algorithm for wireless sensor networks[ C]// PACRIM 2009: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. Piscataway: IEEE Press, 2009:140 - 145.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部