期刊文献+

基于信任的无线传感器网络动态密钥管理方案

Trust-based Dynamic Key Management in Wireless Sensor Networks
下载PDF
导出
摘要 在无线传感器网络安全体系中,密钥方案在解决面临内部攻击时抵抗能力较弱;作为密钥方案重要补充的信任管理机制,在识别被俘节点,解决内部攻击等方面有着优势;结合上述两者特点,提出了一种TDKM(Trust based Dynamic Key Management in wire-less sensor networks)方案,它将信任机制引入传统的动态密钥管理方案中,以节点的信任值作为判断被俘节点的依据,主动监测被俘节点,再通过动态密钥管理方案更新系统管理密钥;仿真结果表明,采用此模型显著增强了网络对捕获节点的抵抗性,有效解决了网络节点的共谋问题。 In the wireless sensor network security system, cryptography based security solutions are vulnerable when they confront inner --attacks, which are caused by captured nodes. As the cardinal complement of the cryptography based security solutions, trust management mechanism has its advantages in recognizing captured nodes and dealing with inner-- attacks. In regards to these two features, this paper pro- poses TDKM, a Trust based Dynamic Key Management in wireless sensor networks, which introduces trust mechanism into the traditional dynamic key management scheme, with the trust value of nodes as a basis for judging the captured nodes, actively monitor the captured nodes, and then updates system communication key through dynamic key management scheme. Simulation results show that this model sig- nificantly enhances the repellency of the network towards the captured nodes, effectively solves the collusion problem.
作者 程伟 程良伦
出处 《计算机测量与控制》 CSCD 北大核心 2011年第9期2315-2318,共4页 Computer Measurement &Control
基金 国家自然科学基金(60673132) 广东省自然科学基金(07117421 8351009001000002) 广东省重大科技专项(2009A080207008)
关键词 无线传感器网络 动态密钥管理 EBS 信任 TDKM wireless sensor networks (WSNs) dynamic key management EBS trust TDKM
  • 相关文献

参考文献9

  • 1Esehenauer L, Gligor VD. A key--management scheme for distrib- uted sensor networks [A]. Proceedings of the 9th ACM Conference on Computer and Communication Security [C]. 2002 : 41 - 47.
  • 2朱琪美,张世庆.分簇无线传感器网络中的密钥分组管理方案研究[J].计算机测量与控制,2007,15(2):216-218. 被引量:3
  • 3Eltoweissy M, Heydari H, Morales L, Sadborough H. Combinato- rial optimization of key management in group communications [J]. Journal of Network and Systems Management, 2004, 12 (1) : 33-50.
  • 4Eltoweissy M, Moharmm M, Mukkamala R. Dynamic key man- agement in Sensor networks [J]. IEEE Communications Maga- zine, 2006, 44 (4): 122-130.
  • 5Ganeriwal S. Srivastava M. Reputation--based framework for high integrity sensor networks [A]. Proc of the 2nd ACM Workshop on security of Ad Hoc and Sensor Networks [C]. 2004:66 -77.
  • 6Krasniewski MD. Varadharajan P. Rabeler B. Bagehi S, Hu YC TIBFIT: Trust index based fault tolerance for ability data faults in sensor [A]. Proe of the Int'l Conf. on Dependable Systems and Networks [C]. 2005: 627- 681.
  • 7Josang A, Ismail R. The Beta Reputation System [A]. Proc of the 15th Bled Electronic Commerce Conference [C]. Bled, Slovenia, June 2002.
  • 8孔繁瑞,李春文.无线传感器网络动态密钥管理方法[J].软件学报,2010,21(7):1679-1691. 被引量:12
  • 9Chorzempa M, Par JM, Eltoweissy M. Key management for long --lived sensor networks in hostile environments [J]. Computer Communications, 2007, 30 (3) : 1964 - 1979.

二级参考文献17

  • 1Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/1282.htm.
  • 2Du WL,Deng J,Yunghsiang SH,Pramod KV.A key predistribution scheme for sensor networks using deployment knowledge.IEEE Trans.on Dependable and Secure Computing,2006,3(1):62-77.[doi:10.1109/TDSC.2006.2].
  • 3Eschenauer L,Gligor VD.A key-management scheme for distributed sensor networks.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.Washing:ACM Press,2002.41-47.
  • 4Eltoweissy M,Heydari H,Morales L,Sadborough H.Combinatorial optimization of key management in group communications.Journal of Network and Systems Management,2004,12(1):33-50.[doi:10.1023/B:JONS.0000015697.38671.ec].
  • 5Eltoweissy M,Moharrum M,Mukkamala R.Dynamic key management in sensor networks.IEEE Communications Magazine,2006,44(4):122-130.[doi:10.1109/MCOM.2006.1632659].
  • 6Riaz R,Ali A,Kim KH,Ahmad F,Suguri H.Secure dynamic key management for sensor networks.In:Proc.of the Innovations in Information Technology.Dubai:IEEE Press,2006.1-5.
  • 7Moharrum M,Eltoweissy M,Mukkamala R.Dynamic combinatorial key management scheme for sensor networks.Wireless Communication and Mobile Computing,2006,6(7):1017-1035.[doi:10.1002/wcm.435].
  • 8Li LC,Li JH,Tie L,Pan J.ACKDs:An authenticated combinatorial key distribution scheme for wireless sensor networks.In:Proc.of the 8th ACIS Int'l Conf.on Software Engineering,Artificial Intelligence,Networking,and Parallel Distributed Computing (SNPD).Qingdao:IEEE Press,2007.262-267.
  • 9Younis MF,Ghumman K,Eltoweissy M.Location-Aware combinatorial key management scheme for clustered sensor networks.IEEE Trans.on Parallel and Distributed Systems,2006,17(8):865-882.[doi:10.1109/TPDS.2006.106].
  • 10Heinzelman WB,Chandrakasan AP,Balakrishnan H.An application-specific protocol architecture for wireless microsensor networks.IEEE Trans.on Wireless Communications,2002,1(4):660-670.[doi:10.1109/TWC.2002.804190].

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部