期刊文献+

无线传感器网络簇结构中基于IBE的组密钥管理方案 被引量:1

IBE-based Group Key Management Scheme in Wireless Sensor Networks
下载PDF
导出
摘要 探讨了已有一些组密钥管理方案的优缺点,提出了基于无线传感器网络分簇结构的组密钥管理方案,将簇头作为密钥管理器,采用基于IBE改进的算法来安全分发组密钥.对方案的可行性,安全性和性能进行了理论分析,结果表明方案具有良好的综合性能. It discussed the advantages and disadvantages of existing group key management schemes.Base on cluster construction,It proposed a new group key management scheme,which takes a cluster header as a group key manager,and uses based on IBE refined algorithm for distributing group key.It also presented in depth theory analysis of the new scheme in terms of feasibility,security and other performances.The result shows that the proposed scheme provides better performances.
作者 陈建伟 许力
出处 《福建师范大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第4期55-60,共6页 Journal of Fujian Normal University:Natural Science Edition
基金 福建省自然科学基金资助项目(2008J0014) 福建省教育厅资助项目(03BA757)
关键词 无线传感器网络 组密钥管理 基于身份标识加密 wireless sensor networks group key management IBE
  • 相关文献

参考文献10

  • 1Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach [C] //Proceedings of IEEE Infocom'05, New York, 2005, 503-514.
  • 2曾玮妮,林亚平,胡玉鹏,易叶青,李小龙.传感器网络中一种基于分布式更新权限的组密钥管理方案[J].计算机研究与发展,2007,44(4):606-614. 被引量:11
  • 3Zhu S, Setia S, Xu S, et al. GKMPAN: An efficient group rekeying scheme for secure multicast in Ad-hoc networks [C] //Proc of the First Annual International Conferenee on Mobile and Ubiquitous Systems: Network- ing and Services, Oakland: IEEE Computer Society, 2006: 301-325.
  • 4Eltoweissy M, Moharrum M, Mukkamala R. Dynamic key management in sensor networks [J].IEEE Communications Mazine, 2006, 44 (4), 122- 130.
  • 5杨庚,余晓捷,王江涛,程宏兵.基于IBE算法的无线传感器网络加密方法研究[J].南京邮电大学学报(自然科学版),2007,27(4):1-7. 被引量:8
  • 6刘晓文,王淑涵,王振华,赵海登.无线传感器网络中基于IBE算法的组密钥管理方案[J].计算机应用研究,2009,26(8):3070-3072. 被引量:1
  • 7D Boneh, M Franklin. Identity-based Eneryption from the Weil Pairing [C] //Advances in Cryptology - CRYPTO 2001, Berlin: Springer-Verlag, 2001: 213-229.
  • 8Yu Ng Ching , Y Mu, W Susifo, An identity-based broadcast encryption scheme for mobile ad hoe networks [J]. communications and information technology, 2006, 1 : 24-29.
  • 9Gura N, Patel L A, Wander A, et al. Comparing elliptic curve cryptography and RSA on 8 bit CPUs [C]// Proceedings of the Workshop on Cryptography Hardware and Embedded Systems (CHES2004), Boston; Computer Science, 2004; 119-132.
  • 10I.auter K. The advantages of elliptic curve cryptography for wireless security [J]. IEEE Wireless Communications, 2004, 11 (1): 62-67.

二级参考文献38

  • 1曾玮妮,林亚平,胡玉鹏,易叶青,李小龙.传感器网络中一种基于分布式更新权限的组密钥管理方案[J].计算机研究与发展,2007,44(4):606-614. 被引量:11
  • 2杨庚,余晓捷,王江涛,程宏兵.基于IBE算法的无线传感器网络加密方法研究[J].南京邮电大学学报(自然科学版),2007,27(4):1-7. 被引量:8
  • 3I F Akyildiz,W Su,Y Sankarasubramaniam,et al.Wireless sensor networks:A survey[J].Computer Networks,2002,38(4):393-422
  • 4F Ye,H Luo,S Lu,et al.Statistical en-route filtering of injected false data in sensor networks[C].IEEE Infocom' 04,Hongkong,2004
  • 5S Zhu,S Setia,S Jajodia,et al.An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks[C].IEEE Symp on Security and Privacy,Oakland,2004
  • 6A Perrig,J Stankovic,D Wagner.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57
  • 7C Blundo,A De Santis,A Herzberg,et al.Perfectly-secure key distribution for dynamic conferences[G].In:Lecture Notes in Computer Science 740.Berlin:Springer,1993.471 -486
  • 8H Harney,C Muckenhirn,T Rivers.Request for Comments (RFC) 2094.Group key management protocol architecture[S].Intemet Engineering Task Force.1997
  • 9D Liu,P Ning,K Sun.Efficient self-healing group key distribution with revocation capability[C].ACM CCS,Washington DC,2003
  • 10W Zhang,G Cao.Group rekeying for filtering false data in sensor networks:A predistribution and local collaboration-based approach[C].IEEE Infocom'05,Miami,FL,2005

共引文献16

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部