期刊文献+

无线传感器网络中一种基于公钥的密钥分配方案 被引量:3

Public key based key distribution scheme for wireless sensor networks
下载PDF
导出
摘要 针对基于对称密钥的密钥分配技术无法彻底解决无线传感器网络中密钥分配的安全问题,提出了一种基于公钥的密钥预分配方案,基站利用一系列原始公钥和单向散列函数产生公钥集合,并为每个节点随机分配公私钥对和公钥集合的子集。由于私钥的唯一性,采用该方案不仅能够提高网络的安全性能,而且可以改善网络的存储开销。利用随机图论的相关原理证明,该方案与传统的密钥预分配方案相比,既保证了网络的安全,又兼顾了网络和节点资源有限的实际,在连通性不变的前提下,其网络安全性和网络的扩展性大幅度提高。 Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.
作者 黄杰 黄蓓
出处 《通信学报》 EI CSCD 北大核心 2011年第10期52-58,共7页 Journal on Communications
基金 国家高技术研究发展计划("863计划")基金资助项目(2009AA01Z427) 江苏省产学研联合创新基金项目支持(BY2009149) 信息网络安全公安部重点实验室开放课题~~
关键词 无线传感器网络 公开密钥算法 对称密钥算法 连通性 扩展性 wireless sensor network asymmetric key algorithm symmetric key algorithm connectivity scalability
  • 相关文献

参考文献20

  • 1HWANG D D, LAI B C, VERBAUWHEDE I. Energy- memory-security tradeoffs in distributed sensor networks[A]. 3rd International Conference on Ad-Hoc Networks and Wireless (AD- HOC-NOW)[C]. 2004.70-81.
  • 2ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks[A]. Proc of the 9th ACM Conf on Computer and Communications Security[C]. 2002.41-47.
  • 3CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[A]. IEEE Symposium on Research in Security and Privacy[C]. 2003. 197-213.
  • 4CHENG Y, AGRAWAL D P. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks[J]. Ad Hoe Networks, 2007,(v5): 35-48.
  • 5CHENG Y, AGRAWAL D P. Efficient pairwise key establishmentand management in static wireless sensor networks[A]. Proceedings of the Second IEEE International Conference on Mobile ad hoc and Sensor Systems[C]. Washington, DC, 2005.7-10.
  • 6LILT D, NING P. Establishing pairwise keys in distributed sensor networks[A]. Proceedings of the Conference on Computer and Communications Security'03[C]. ACM Press, Washington DC 2003. 52-61.
  • 7DU W, DENG J, HAN Y S, et al. A key predistribution scheme for wireless sensor networks using deployment knowledge[J]. IEEE Transaction on Dependable and Secure Computing, 2006,3(1): 62-77.
  • 8DU W, WANG R, NING P. An efficient scheme for authenticating public keys in sensor networks[A]. 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing[C]. 2005.
  • 9GAO J, SION R, LEDERER S. Collaborative location certification for networks[A]. ACM Transactions on Sensor Networks[C]. 2010.30-55.
  • 10WANG H, LI Q. Efficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes[R]. Technical Report WM-CS- 2006-07, College of William & Mary (2006), 2006.

同被引文献27

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2周云晖,孙富春,张钹,王俊峰,王滨.一种基于时隙划分的三层卫星网络QoS路由协议[J].计算机学报,2006,29(10):1813-1822. 被引量:19
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4Suganthi N, Priya R S M, Sumathy V. An efficient and dynamic key management scheme for mobile Ad hoc networks[J]. European Journal of Scientific Research, 2011,55 (4): 538-548.
  • 5Blom R. An optimal class of symmetric key generation systems [C]//Advance in Cryptology-EUROCRYPT' 84. 1984: 335-338.
  • 6Cheng Y, Agrawal D P. Efficient pairwise key establishment and management in static wireless sensor networks[C]//Proceeding of the 2nd IEEE International Conference on Mobile Ad Hoc and Sensor Systems. 2005.
  • 7Esehenauer L, Gligor V. A key management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press, 2002: 41-47.
  • 8Chan H,Perrig A, Song D. Random key predistribution schemes for sensor networks[C]//Proceedings of the 2003 IEEE Symposium. On Security and Privacy. Washington: IEEE Computer Society, 2003 : 197-213.
  • 9Gomez C,Paradells J.Wireless home automation networks:a survey of architectures and technologies[J].Consumer communications and networking,2010 (6):92-10.
  • 10Verma V K,Singh S,Nagendra P.Pathak.Analysis of schability for AODV routing protocol in wireless sensor networks.International Journal for Light and Electron Optics[J].2014,125 (2):748-750.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部