期刊文献+

基于有理正规曲线的WSN密钥预分配方案的仿真研究

Simulated Research of Key Pre-distribution Scheme with the Rational Normal Curves for Wireless Sensor Network
原文传递
导出
摘要 密钥管理是无线传感器网络安全机制的重要环节,近年来,研究人员对其进行了广泛地研究,提出了众多理论方案。本文对基于有理正规曲线的密钥预分配方案,进行了性能分析,发现该方案有很高的安全性质,很好的应用价值;于是,编程模拟应用场景,对该方案进行了仿真研究,以利于实际应用。 The Key Management as an important part of security mechanism for wireless sensor networks have been Extensively studied in recent years,and many theoretical solutions have been proposed by researchers;In this paper,The performance of the key pre-distribution scheme based on the rational normal curves is analyzed,and we find that the program has a high safety properties and a good value in the application;so we do the simulation study of the program and make a program to simulate the actual situation,which helps practical application.
出处 《网络安全技术与应用》 2011年第9期45-48,共4页 Network Security Technology & Application
基金 国家自然科学基金项目"信息认证理论研究"(编号90604034)的支持
关键词 无线传感器网络 有理正规曲线 密钥预分配 仿真性研究 Wireless sensor networks Rational normal curve Key pre-distribution Simulation research
  • 相关文献

参考文献4

二级参考文献49

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2Wu Yongan, Li Min, Cai Zhiping, et al. A Distributed Algorithm to Approximate Node-Weighted Minimum α-Connected (θ, k)-Coverage in Dense Sensor Networks[C]//Proc of the Int'l Frontiers of Algorithmics Workshop, 2008.
  • 3Du Wenliang, Deng Jiang. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]//Proc of INFOCOM'04,2004.
  • 4Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks[C]//Proe of the 7th Annual ACM Int'l Conf on Mobile Computing and Networks, 2001.
  • 5CHENG B, SUNGHA D. Reduee Radio Energy Consumption of Key Management Protocol for Wireless Sensor Networks [C]//Proc of ISLPED'04,2004.
  • 6Griffin S P, DeCleene B T, Dondeti L R, et al. Hierarchical Key Management for Mobile Multicast Members[R]. Technical Report, Northrop Grumman Information Technology, 2002.
  • 7Striki M,Baras J S. Key Distribution Protocols for Multieast Group Communication in MANETs[R]. Technical Report JHJTR2003-17, University of Maryland ISR, 2003.
  • 8Gura N,Patel A, Wander A,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs[C]//Proc of the 6th Int'l Workshop on Cryptographic Hardware and Embedded Systems, 2004.
  • 9Wander A S, Gura N, Eberle H, et al. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks[C] //Proc of the 3rd IEEE Int'l Conf on Pervasive Computing and Communications, 2005.
  • 10Malan D, Welsh M, Smith M D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//Proc of the 1st IEEE Int'l Conf on Communications and Networks, 2004.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部