期刊文献+

无线传感器网络门限密钥共享模型 被引量:4

Threshold Key Sharing Model in Wireless Sensor Networks
下载PDF
导出
摘要 针对现有传感器网络密钥管理方案存在的网络连通度低、抗俘获性差、节点能耗高等问题,该文提出一种基于(q,l)门限秘密共享的密钥共享模型,采用"虚拟簇头共享密钥,物理簇头重构密钥"的方式完成簇头与簇成员的密钥协商。该模型实现了簇成员能耗最低、抗俘获性最优的目标,同时门限参数l和q能够调节簇头的抗俘获性、容错性和高效性。理论分析与实验证明,与传统的概率型方案相比,该模型有效地提高了节点抗俘获性和网络连通度,并降低了节点能耗。 Most traditional probabilistic key management schemes of wireless sensor networks have disadvantages of low connectivity,poor resiliency against node capture,and high energy-consumption.A key sharing model is proposed based on(,)-threshold secret sharing.In this model,a key is divided into shadows to be shared by "virtual cluster heads" and re-constructed by the "physical cluster head".For tiny cluster member nodes,this model is optimized in improving their resilience against node capture attacks and saving the energy consumption.At the same time,the cluster head nodes' properties of security,tolerance and efficiency can be adjusted by controlling the parameters of q and.Both theoretic analysis and the experimental results prove that,this model improves effectively the resilience against nodes capture attack and the network connectivity,and decreases the nodes' overheads.
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第8期1913-1918,共6页 Journal of Electronics & Information Technology
基金 国家863计划项目(2009AA044601)资助课题
关键词 无线传感器网络 门限 密钥共享 密钥协商 Wireless sensor networks Threshold Key sharing Pairwise key establishment Clusters
  • 相关文献

参考文献21

  • 1Chen X, Makki K, Yen K, et al.. Sensor network security: asurvey [J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-?3.
  • 2Perrig A, Stankovic J, and Wagner D. Security in wireless sensor networks [J]. Communications of the A CM, 2004, 47(6): 53-57.
  • 3Eschenauer L and Gligor V D. A key management scheme for distributed sensor networks [C]. The 9th ACM Conference on Computer and Communication Proceedings, Washington, DC, USA, Nov. 17-21, 2002: 41-47.
  • 4Chan H W, Perrig A, and Song D. Random key predistribution schemes for sensor networks [C]. 2003 IEEE Symposium on Security and Privacy Proceedings, Berkeley,CA,May 11 14, 2003:197-213.
  • 5Du W L, Deng J, Han Y S, et al.. A key management scheme for wireless sensor networks using deployment knowledge [C]. The 23th Annual Joint Conference of the IEEE Computer and Communications Proceedings, Hong Kong, China, Mar. 7-11. 2004:586-597.
  • 6Levi A, Tasc S E, Lee Y J, et al.. Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools [J]. Journal of Intelligent Manufacturing, 2009, 21(5): 635 645.
  • 7Jaworski J, Ren M, and Rybarczyk K. Random key predistribution for wireless sensor networks using deployment knowledge [J]. Coraputirtg, 2009, 85(1 2): 57-76.
  • 8Liu D G, Ning P, and Li R F. Establishing pairwise keys in distributed sensor networks [J]. ACM Transactions on Information and System Security, 2005, 8(1): 41-77.
  • 9Wang J, Xia Z Y, Harn L, et al. with authentication in sensor Distributed Processing and Nanjing, China, Nov. 2 5, 2005 Storage-optimal key sharing networks [C]. Parallel and Applications Proceedings, 466 474.
  • 10Kim J M, ttan Y J, and Park S H, et al.. N-dimensional grid-based key predistribution in wireless sensor networks [C] 2007 International Conference on Computational Science and lts Applications Proceedings, Kuala Lumpur, Malaysia, Aug. 26 29, 2007:1107-1120.

同被引文献42

  • 1孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3PERRIG A, STANKOVIC J, WAGNER D. Security in wireless sensor networks[ J]. Communications of the ACM, 2004,47(6) :53-57.
  • 4DING Wei, YU Ying-bing, YENDURI S. Distributed first stage detection for node capture [ C ] //Proc of IEEE GLOBECOM Workshops. 2010:1566-1570.
  • 5VU T M, SAFAVI-NAINI R, WILLIAMSON C. Securing wirelesssensor networks against large-scale node capture attacks [ C ] //Proc of the 5th ACM Symposium on Information, Computer and Communications Security. New York:ACM,2010: 112-123.
  • 6NEWSOME J, SHI E,SONG D, et al. The Sybil attack in sensor networks : analysis and defenses [ C ] //Proc of the 3rd International Symposium on Information Processing in Sensor Networks. New York :ACM,2004:259-268.
  • 7ELSON J, GIROD L, ESTRIN D. Fine-grained network time synchronization using reference broadcasts [ C ] //Proc of the 5 th Symposium on Operating Systems Design and Implementation. New York: ACM ,2002: 147-163.
  • 8Diffie W, Hellman M E.New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, IT-22: 644-654.
  • 9Ingemarsson, Tang D, Wong C K.A conference key distri- bution system[J].IEEE Transactions on Information Theory, 1982, IT-28 : 714-720.
  • 10Lu E H,Hwang W Y,Ham L,et al.A conference key distribution system based on the Lagrange interpolating polynomial[C]//The 7th Annual Joint Conference of IEEE Computer and Communication Society, New Orleans, LA, 1988: 1092-1094.

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部