期刊文献+

基于最小生成树的异构传感器网络抗共谋优化方案

A Minimum Spanning Tree Based Optimization Scheme of Collusion Restraining in Heterogeneous Sensor Networks
下载PDF
导出
摘要 基于EBS(Exclusion Basis Systems)的密钥管理协议,以安全性高、动态性和扩展性好,较适用于异构传感器网络,但却存在共谋问题。该文提出了一种基于MST(Minimum Spanning Tree)的密钥共谋问题优化方案。该方案利用Prim算法对由簇内感知节点所构成的无向连通图进行最小生成树求解,并对该树进行遍历,根据所得节点遍历顺序进行密钥的指派与分配,使得相邻节点间所含的密钥重叠程度增大,发生共谋的可能性得到降低。实验结果表明:同比于密钥随机分配方案与SHELL方案,所提方案有效提高了网络的抗捕获能力。 Owing to the better security, dynamic and extensibility, Exclusion Basis Systems (EBS) based key management applies to security of heterogeneous sensor networks, but it suffers from the collusion. This paper introduces a Minimum Spanning Tree (MST) based optimization scheme of key collusion restraining, which uses Prim algorithm to create MST from undirected graph constituted by nodes in cluster. Traversing the tree gets a sequence of nodes. The sequence is used to design and distribute keys in the scheme. It improves the repeated degrees of keys in adjacent nodes and reduces the possibility of key collusion. The experimental results show that the optimization scheme effectively improves the resistant of networks' capture, comparing with SHELL and random distribution method.
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第12期3046-3050,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60973027 61170241) 中央高校基本科研业务费专项资金(HEUCF100601) 博士后科研人员落户黑龙江科研启动资助金(LBH-Q10141) 北京邮电大学网络与交换技术国家重点实验室开放课题(SKLNST-2009-1-10) 黑龙江省教育厅科学技术研究项目(12513049)资助课题
关键词 异构传感器网络 密钥管理 共谋问题 最小生成树(MST) EBS Heterogeneous Sensor Networks (HSN) Key management Collusion issue Minimum Spanning Tree(MST) Exclusion Basis Systems (EBS)
  • 相关文献

参考文献15

  • 1Samundiswary P, Priyadarshini P, and Dananjayan P Performance evaluation of heterogeneous sensor networks[C] Proceedings of ICFCC, Kuala Lumpur, Malaysia, April 3-5 2009: 264-267.
  • 2Liu Zhi-hong, Ma Jian-feng, Huang Qi-ping, et al.. A pairwise key establishment scheme for heterogeneous sensor networks[C]. Proceedings of the International Symposium on Mobile Ad hoc Networking and Computing, Hong Kong, 2008 53-60.
  • 3Younis M, Ghumman K, and Eltoweissy M. Key management in wireless Ad hoc networks: collusion analysis and prevention[C]. Proceedings of the 24th IEEE International Performance, Computing and Communications Conference, Phoenix, Arizona USA, April 7-9, 2005: 199-203.
  • 4Eltoweissy M, Heydari H, Morales L, et al.. Combinatorial optimization of key management in group communications[J]. Journal of Network and Systems Management, 2004, 12(1): 33-50.
  • 5Wang Huan-zhao, Luo Dong-wei, and Guo Yu-fei. TLKMS: a dynamic keys management scheme for large-scale wireless sensor networks[C]. Proceedings of ICCSA, Kuala Lumpur, Malaysia, August 26-29, 2007: 559-572.
  • 6Kim Jong-Myoung, Cho Joon-Sic, Jung Sung-Min, et al.. An energy-efficient dynamic key management in wireless sensor networks[C]. Proceedings of the 9th ICACT, Phoenix Park, Korea, 2007: 2148-2153.
  • 7孔繁瑞,李春文,丁青青,崔光照,崔昺祎.一种基于EBS的无线传感器网络动态密钥管理方法[J].电子与信息学报,2009,31(5):1045-1048. 被引量:4
  • 8Lo Chi-chun, Huang Chun-chieh, and Chen Shu-wen. An efficient and scalable EBS-based batch rekeying scheme for secure group communications[C]. Proceedings of IEEE MILCOM, Boston, USA, October 18-21, 2009: 1-7.
  • 9Eltoweissy M, Moharrum M, and Mukkamala R. Dynamic key management in sensor networks[J]. IEEE Communications Magazine, 2006, 44(4): 122-130.
  • 10Ma Chun-guang, Geng Gui-ning, and Wang Hui-qiang. Location-aware and secret-share based dynamic key management scheme for wireless sensor network[C]. Proceedings of NSWCTC, Wuhan, China, April 25-26, 2009: 770-773.

二级参考文献37

  • 1邱慧敏,杨义先,钮心忻.无线传感器网络中广播通信的安全协议设计[J].北京邮电大学学报,2006,29(5):103-106. 被引量:7
  • 2沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 3Akyildiz I F, Su W, and Sankarasubramaniam Y. Wireless sensor networks: A survey[J]. Computer Networks, 2002, 38(4): 393-422.
  • 4Qi H, Iyengarb S, and Chakrabartyk K. Distributed sensor networks-a review of recent research[J]. Journal of the Franklin Institute, 2001, 338(6): 655-668.
  • 5Aboelaze M and Aloul F. Current and future trends in sensor networks: A survey[C]. Second International Conference on Wireless and Optical Communications Networks (IFIP 2005). Sydney: IEEE Press, 2005: 551-555.
  • 6Eltoweissy M, Heydari H, Morales L, and Sadborough H. Combinatorial optimization of key management in group communications[J]. Journal of Network and Systems Management, 2004, 12(1): 33-50.
  • 7Mohamed Eltoweissy, Mohammed Moharrum, and Ravi Mukkamala. Dynamic key management in sensor networks [J]. IEEE Communications Magazine, 2006, 44(4): 122-130.
  • 8Eschenauer L and Gligor V D. A key-management scheme for distributed sensor networks[C]. Proceedings of the 9th ACM conference on Computer and communications security. Washing D.C: ACM Press., 2002: 41-47.
  • 9Younis M F, Kajaldeep Ghumman, and Mohamed Eltoweissy. Location-aware combinatorial key management scheme for clustered sensor networks[J]. IEEE Trans. on Parallel and Distributed Systems, 2006, 17(8): 865-882.
  • 10Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, and Larry Wilson. Group key management scheme for large-scale sensor networks [J]. Ad hoc Networks, 2005, 3(5): 668-688.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部