期刊文献+

无线传感器网络簇状分层密钥管理方案设计 被引量:3

A Hierarchical Cluster-based Key Management Scheme for WSN
下载PDF
导出
摘要 密钥管理对于无线传感器网络的系统安全有着十分重要的意义。该文在研究现有无线传感器网络密钥管理机制的基础上,提出一种适合簇状分层网络结构的密钥管理方案。 Key management is important for the security of the wireless sensor network.After studying the existing key management for WSN,a key management scheme for the hierarchical cluster network is proposed in this paper to enhance the security of the WSN.
机构地区 [ [ [
出处 《舰船电子工程》 2011年第11期108-111,共4页 Ship Electronic Engineering
关键词 无线传感器网络 安全 密钥管理 wireless sensor network security key management
  • 相关文献

参考文献14

  • 1Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks [C]//ACM International Conference on Computer and Communications Security(Special Is sue on Wireless Sensor Networks) ,2004,47(6) :53-57.
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3Chris Karlof, Naveen Sastry, David Wagner. TinySec:a link layer security architecture for wireless sensor networks[C]//ACM International Conference on Em- bedded Networked Sensor Systems. New York.- ACM Press, 2004 : 162-175.
  • 4Gaubatz G, Kaps J, Sunar B. Public keys cryptography in sensor networks--Revisited [ C ]//1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS). New York.. ACM Press,2004:2-18.
  • 5Zia T A, Zomaya A Y. A secure triple-key manage- ment scheme for wireless sensor networks[C]//IEEE INFOCOM 2006 Students Workshop. Piseataway: IEEE Communication Societ, 2006: 62-69.
  • 6Esehenauer L, Gligor V. A key management scheme for distributed sensor networks[C]//ACM International Conference on Computer and Communications Security. New York:ACM Press,2002:41-47.
  • 7Du W, Deng J, Han YS, et al. A key management scheme for wireless sensor networks using deployment Kcbowledge[C]//IEEE INFOCOM. Piscataway: IEEE Press, 2004 : 586 - 597.
  • 8Moharrum MA, Eltoweissy M. A study of static versus dynamic keying schemes in sensor networks[C]// 2nd ACM Int'l Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. New York: ACM Press,2005:122-129.
  • 9Chan H, Perrig A. PIKE: Peer intermediaries for key establishment in sensor networks [C]//IEEE INFOCOM 2005. Piscataway: IEEE Communication Society, 2005 : 524-535.
  • 10Du W, Deng J, Han YS, et al. A pairwise key predistribution scheme for wireless sensor networks [C]//ACM International Conference on Computer and Communications Security. New York: ACM Press, 2003 : 42-51.

二级参考文献45

共引文献128

同被引文献21

  • 1BCharlesk,J.Shari.信息安全原理与应用[M].北京:电子工业出版社,2004:527-535.
  • 2Shamir A. Identity based Cryptosystem and Signature Schemes [A]. In: Cryptology Crypto' 84, LNCS 196 [C] //Berlin: Springer Verlag, 1984 : 47-53.
  • 3Dan Boneh, Matt Franklin. Identity based gncryption from Weil Pairing[A]. In: Cryptology Crypto'01, LNCS 2139[C]//Ber- lin: Springer-Verlag, 2001 : 213-229.
  • 4Horwitz J, Lynn B. Toward Hierarchical Identity-based Encryp tion[A]. In.- Knudsen L, EUROCRYPT 2002[C] // Berlin= Springer-Verlag,2001:466 481.
  • 5Xavier. Boyen, 13rent. Waters. Anonymous Hierarchical Identi ty Based Encryption (without Random Oracles) [A]. In.- Crypto 2006, LNCS 4117[C]//2006:290-307.
  • 6Craig Gentry, Alice Silerberg. Hierachical ID-based Cryptogra- phy[A]. In.- ASICCRYPT 2002[C]//Berlim Springer-Verlag, 2002:548 566.
  • 7Dan Boneh,Xavier Boyen, Eu-Jin Coll. Hierarchaical identity based encryption with constant size ciphertext[A]. In: Euroerypt 2005, LNCS 3494[C]//Berlin: Springer-Verlag, 2005 : 440 456.
  • 8Michel Abdalla, Dario Catalano, etal. Identity-Based Encryp tion Gone Wild[A]. In: ICALP 2006 [C]//Berlin: Springer- Verlag, 2006 : 300-311.
  • 9M. Chase. Multi-authority attribute-based encryption[A]. In : TCC'07, LNCS 4392[C]//2007 .. 515-534.
  • 10李丽军,王代华,祖静.基于CC1100的无线数据传输系统设计[J].国外电子测量技术,2007,26(12):42-45. 被引量:31

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部