期刊文献+

一种基于多项式的无线传感器网络密钥管理方案 被引量:1

Key management scheme based on polynomial for WSN
下载PDF
导出
摘要 提出一种基于多项式的无线传感器网络密钥管理方案。基站通过计算节点秘密信息构成的多项式来生成网络的全局密钥,节点通过全局密钥可以认证网络中的合法节点。节点用全局密钥经过Diffie-Hellman密钥交换来生成与邻居节点之间唯一的会话密钥。该方案能够动态更新密钥,从而解决了由于节点被捕获所导致的信息泄露、密钥连通性下降和密钥更新通信开销大等问题。性能分析表明,该方案与现有的密钥预分配方案相比,具有更低的存储开销、通信开销、良好的扩展性和连通性。 This paper presented a key management scheme based on polynomial for wireless sensor network(WSN).The base station calculated the polynomial formed by the secret information of the nodes to generate a global network key,through which the nodes could certify the legitimate nodes in the network.The nodes generated the unique session keys between the neighbor nodes through the global network key after Diffie-Hellman key exchange.This scheme could dynamically update the keys so as to solve several problems such as: information disclosure when some nodes were captured,the decline of key connectivity and higher communication overhead when key was renewed.The analysis of performance show that this scheme has a lower storage cost,a lower communication overhead,good scalability and connectivity,compared to some existing pre-distribution schemes.
出处 《计算机应用研究》 CSCD 北大核心 2011年第9期3532-3534,共3页 Application Research of Computers
基金 国家自然科学基金重点项目(60633020) 陕西省自然科学基金资助项目(2010JM8034) 武警工程学院基础基金资助项目(wjy201024)
关键词 无线传感器网络 密钥管理 多项式 DIFFIE-HELLMAN密钥交换 WSN key management polynomial Diffie-Hellman key exchange
  • 相关文献

参考文献7

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3Akyilidiz I F,Su W,Sankarasubramaniam Y,et al.A survey on sensor networks. IEEE Communications Magazine . 2002
  • 4Eschenauer L,Gligor VD.A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communication Security . 2002
  • 5Chan H,Perrig A,Song D.Random Key Predistribution Schemes for Sensor Networks. Proceedings of IEEE 2003 Symposium on Research in Security and Privacy . 2003
  • 6Cheng Y,Agrawal D P.Distributed Pairwise Key Es-tablishment in Wireless Sensor Networks. Pro-ceedings of the2006International Conference on Per-vasive Systems&Computing(PSC’06) . 2006
  • 7Pietro R D,Mancini L V,Mei A.Random Key Assignment for Secure Wireless Sensor Networks. Proc of ACM Workshop on Security in Ad Hoc and Sensor Networks . 2003

二级参考文献20

  • 1Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 2Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 3Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11.
  • 4Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47.
  • 5Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71.
  • 6Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213.
  • 7Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13.
  • 8Liu D,Ning P.Multi-level μTESLA:broadcast authentication for distributed sensor networks[J].ACM Transactions in Embedded Computing Systems (TECS),2004,3(4):800-836.
  • 9Shamir A.Identity-based cryptography and signature schemes[A].Advances in Cryptology,CRYPTO'84,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1985,196:47-53.
  • 10Boneh D,Franklin M.Identity-based encryption from the Weil pairing[A].Advances in Cryptology,CRYPTO 2001,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,2001.2139.213-229.

共引文献169

同被引文献15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部