期刊文献+

基于簇内分组的ECC密钥管理方案 被引量:1

A Key Management Scheme Using ECC with Grouping Cluster
下载PDF
导出
摘要 根据椭圆曲线密码(Elliptic Curve Cryptography,简称ECC)体制,论文提出了一种逻辑簇内分组结构的无线传感器网络(Wireless Sensor Networks,简称WSN)的ECC密钥管理方案。方案将簇内节点逻辑划分成多个组,每个组共享不同的通信密钥,簇头实时掌握簇内每个组的通信密钥,簇内节点通过所在组的共享密钥与簇头通信,确保了通信的安全性。理论分析和仿真实验表明,本方案在保障密钥安全的前提下,有效地减少了密钥协商过程中的通信能量消耗,非常适合资源有限的大规模无线传感器网络。 Based on Elliptic Curve Cryptography(which is short for ECC) mechanism,propose an ECC key management scheme for a wireless sensor network which has a logical grouping structure within the cluster.This scheme divides the cluster into multiple logical groups,and each group shares different communication key.The cluster header controls every group's communication key in real time and the cluster members communicate with the cluster header through the group's sharing secret key they belonged to which can ensure the safety of communication.The theory analysis and simulation results show that this scheme effectively reduces communication power consumption during the process of negotiating secret key under the premise of ensuring key security,is very suitable for a large-scale wireless sensor network of limited resources.
出处 《计算机技术与发展》 2012年第2期176-180,共5页 Computer Technology and Development
基金 国家自然科学基金(60973139 61003039 61003236) 江苏省科技支撑计划(工业)项目(BE2010197 BE2010198) 江苏省高校自然科学基础研究项目(10KJB520013 10KJB520014) 高校科研成果产业化推进工程项目(JH10-14) 教育部博士点基金(20103223120007) 江苏省六大高峰人才项目(2008118) 江苏省计算机信息处理技术重点实验室基金(KJS1022) 南京邮电大学引进人才项目(NY210077) 东南大学计算机网络和信息集成教育部开放研究基金(K93-9-2010-13) 江苏高校优势学科建设工程资助项目
关键词 椭圆曲线加密 簇内分组 无线传感器网络 组密钥管理 elliptic curve cryptography grouping cluster wireless sensor networks group key management
  • 相关文献

参考文献12

  • 1Jr M A S,Barreto P S L M, Margi C B,et al. A survey on key management mechanisms for distributed wireless sensor networks[ J]. Computer Networks ,2010,54( 15 ) :2591-2612.
  • 2李慧贤,庞辽军,王育民.适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117. 被引量:18
  • 3Amin F, Jahangir A H, Rasifard H. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security [ C ]// Proc of World Academy of Science, Engineering and Technology. [s. l. ] :[s. n. ] ,2008:529-534.
  • 4Chuang P J,Chang S H,Lin C S. A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks [J]. Journal of Information Science and Engineering,2010,26 (5) :1859-1873.
  • 5Noreozi E, Kadivar J, Shafiee S H. Energy Analysis for Wireless Sensor Networks [C]//2010 2nd International Conference on Mechanical and Electronics Engineering. [ s. l. ] : [ s. n. ], 2010:382-386.
  • 6Munivel E, Ajit D G M. Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks [ C ]//International Conference on Wireless Communication and Sensor Computing. [s. l. ] :[s.n. ] ,2010.
  • 7Huang Xu, Shah P, Sharma D. Fast Algorithm in ECC for Wireless Sensor Network[C]//Proceedings of the International Multiconference of Engineers and Computer Scientists. [ s. l. ] :[s. n. ] ,2010.
  • 8Malan D J, Welsh M, Smith M D. Implementing Pubhc- Key Infrastructure for Sensor Networks [ J ]. ACM Transactions on Sensor Networks, 2008,4 (4) : 234 -239.
  • 9徐守志,杨宗凯,谭运猛.基于椭圆曲线的分布式组播密钥管理方案[J].小型微型计算机系统,2006,27(4):651-654. 被引量:3
  • 10Dahshan H, Irvine J. An Elliptic Curve Distributed Key Management for Mobile Ad Hoc Networks[ C]//2010 IEEE 71st Vehicular Technology Conference ( VTC 2010-Spring). [ s. l. ] : [ s. n. ] ,2010.

二级参考文献37

  • 1向华萍,万仲保.基于ECC的身份认证系统的设计与实现[J].微计算机信息,2007,23(3):87-88. 被引量:8
  • 2庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 3Shamir.A, How to share a secret [J], Commun,ACM,1979,22(11): 612-613.
  • 4Blakley.G.R, Safeguarding cryptographic keys [J], Proc,NCC, 1979, (AFIPS Press, Montvale, NJ), 48:313-317.
  • 5ESCHENAUER L,GLIGOR V D. A key-management scheme for distributed sensor networks [ C ]//Proc of the 9th ACM Conference on Computer and Communications Security. 2002.
  • 6CHAN H, PERRIG A, SONG D. Random key pre-distribution schemes for sensor networks [ C ]//Proc of IEEE Symposium on Security and Privacy. 2003.
  • 7DU Wen-liang, DENG Jing, HAN Y S,et al. A pairwise key pre-distribution scheme for wireless sensor networks [ C]//Prec of the 10th ACM Conference on Computer and Communications Security. 2003: 42-51.
  • 8CHENG Y, AGRAWAL D P. Efficient pairwise key establishment and management in static wireless sensor networks [ C ]//proc of the 2nd IEEE International Conference on Mobile Ad hoc and Sensor Systems. 2005.
  • 9LIU Dong-gang, NING Peng. Improving key pre-distribution with deployment knowledge in static sensor networks [ J ]. ACM Trans on Sensor Networks,2005,1 (2) :204-239.
  • 10ZHAO S,TEPE K,SESKAR l,et al. Routing protocols for self-organizing hierarchical Ad hoc wireless networks[ C]//Proc of IEEE Samoff 2003 Symposium. 2003:168-176.

共引文献20

同被引文献10

  • 1ZHOU Rui,YANG Hua.A Hybrid Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Ecc and Trivariate Symmetric Polynomial[C].Bali:Proceedings of 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering (URKE),2011:251-255.
  • 2ZHANG Liping,CUI Guohua,YU Zhigang.An Efficient Group Key Agreement Protocol for Ad Hoc Networks[C].Dalian,China:Proceedings of 4th International Conference on Wireless Communications,Networking and Mobile Computing,2008:1-5.
  • 3ZHOU Yun,ZHANG Yanchao,FANG Yuguang.Access Control in Wireless Sensor Networks[J].Ad Hoc Networks,2007,5(1):3-13.
  • 4DAHSHAN H,IRVINE J.An Elliptic Curve Distributed Key Management for Mobile Ad H oc Networks[C].Taipei,Taiwan:Proceedings of 2010 IEEE 71st Vehicular Technology Conference (VTC 2010-Spring),2010:1-5.
  • 5ZHU Sencun,SANJEEV SETIA,SUSHIL JAJODIA.LEAP+:Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks[J].ACM Transactions on Sensor Networks (TOSN),2006,2 (4):500-528.
  • 6DENG Jing,CARL HARTUNG,RICHARD HAN,et al.A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks[C].Boulder:Proceedings of 1st IEEE/CreateNet Conference on Security and Privacy in Communications Networks (SecureComm 2005),2005:289-302.
  • 7HEINZELMAN W R,CHANDRAKASAN A,BALAKRISHNAN H.Energy-Efficient Communication Protocol for Wireless Microsensor Networks[C].MIT,Cambridge,MA,USA:Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000:10-12.
  • 8ZHENG Xinliang,CHIN-TSER HUANG,MANTON MATTHEWS.Chinese Remainder Theorem Based Group Key Management[C].Las Vegas Nevada,USA:Proceedings of the 2009 International Conference on Security & Management,2007:266-271.
  • 9李慧贤,庞辽军,王育民.适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117. 被引量:18
  • 10张兴,何泾沙,韦潜.无线传感器网络中节点移动场景下的密钥管理方法[J].东南大学学报(自然科学版),2011,41(2):227-232. 被引量:6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部