期刊文献+

新的无线传感器网络密钥预分配方案 被引量:2

New key pre-distribution scheme for wireless sensor networks
下载PDF
导出
摘要 基于二元对称多项式的随机密钥预分配方案为节点的通信提供了一种安全机制,但这些方案都存在t门限性质问题。为了更好地解决此问题,提高网络的安全阈值及节点的抗俘获能力,采用同化三元多项式代替二元对称多项式来建立节点间通信,并对共享密钥使用单向hash函数进行处理,提高了密钥破解难度。同时采用六边形部署模型,提高网络的安全连通率,减少被捕获节点的影响范围。分析结果表明,该方案提高了网络的安全性及节点的抗毁性,降低了节点间的通信开销。 Based on bivariate symmetric polynomials of random key pre-distribution scheme,a safety mechanism was provided for the nodes communication;however,there are problems related to t threshold property.In order to well solve this problem,and to improve the safety threshold value of network and nodes ability of anti-trapping,this paper used common trivariate polynomial instead of binary symmetrical polynomial to build communication among nodes,and one-way function was used to process the shared key to increase the difficulty of cracking keys.Meanwhile,hexagon-based deployment mode was employed to enhance the safe connectivity rate of the network,and reduce the range that is influenced by the captured nodes.The analytical results show that this scheme has higher anti-destroying ability and security,and also reduces the overhead of communication among nodes.
出处 《计算机应用》 CSCD 北大核心 2012年第6期1613-1615,1619,共4页 journal of Computer Applications
基金 国家自然科学基金地区科学基金资助项目(61163038 61063041)
关键词 无线传感器网络 同化三元多项式 六边形部署模型 密钥预分配 HASH函数 Wireless Sensor Network(WSN) common trivariate polynomial hexagon deployment model key pre-distribution hash function
  • 相关文献

参考文献12

  • 1YICK J, MUKHERJEE B, GHOSAL D. Wireless sensor network survey[ J]. IEEE Computer Networks, 2008, 52(12) : 2292 - 2300.
  • 2MAO GUOQIANG, FIDAN B, ANDERSON B D O. Wireless sensor network localization techniques [ J]. IEEE Computer Networks, 2007, 51(1) : 2529 -2553.
  • 3NEUMAN B C, TS'O T. An authentication service for computer net- works[ J]. IEEE Communications, 1994, 32(9) : 33 - 38.
  • 4ESCHENAUER L, GLIGOR V D. A key management scheme for distributed sensor networks[ C]// Proceedings of the 9th ACM Con- ference on Computer and Communications Security. New York: ACM Press, 2002:41 -47.
  • 5CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[ C]// Proceedings of IEEE 2003 Sym- posium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003:197 -213.
  • 6BLUNDO C, SANTIX A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [ C]// Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Spring-Verlag, 1992:471-486.
  • 7LIU DONGGANG, NING PENG. Establishing pairwise keys in dis- tributed sensor networks[ C]//Proceedings of the 10th ACM Confer- ence on Computer and Communications Security. New York: ACM Press, 2003:52-61.
  • 8LIU DONGGANG, NING PENG, LI RONGFANG. Establishing pairwise keys in distributed sensor networks[ C]// Proceedings of ACM Transactions on Information and System Security. New York: ACM Press, 2005, 8(1): 41-77.
  • 9LIU DONGGANG, NING PENG. Location-based pairwise key es- tablishments for static sensor networks[ C]//Proceedings of the 1 st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003:72-82.
  • 10HUANG D, MEHTA M , MEDHI D, et al . Location aware key management scheme for wireless sensor networks[ C]//Proceedings of the ACM Workshop on Security for Ad Hoc and Sensor Networks ( SASN). New York: ACM Press, 2004:29 -42.

同被引文献14

  • 1刘强,黄小红,冷延鹏,李龙江,毛玉明.Deployment Strategy of Wireless Sensor Networks for Internet of Things[J].China Communications,2011,8(8):111-120. 被引量:29
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3Akyildiz I F, Su W. Sankarasubramanian Y. Wireless Sensor Networks: a Survey [ J ]. Computer Networks,2002,38 (4) : 393 - 422.
  • 4Eschenauer L, Gligor V D. A Key Management Scheme for Distributed Sensor Networks [ C ]//Proceedings of the 9th ACM Conference on Computer and Communication Security. Washington. DC, USA : ACM Press, 2002:41 - 47.
  • 5Chan H, Perrig A, Song D. Random Key Pre-distribution Schemes for Sensor Networks [ C ]//IEEE Symposium in Security and Privacy Berkeley, California : IEEE Computer Society,2003 : 197 - 205.
  • 6Liu D, Ning P, Li R. Establishing Pairwise Keys in Distributed Sensor Networks [ J ]. ACM Transactions on Information and System Security, 2005,8(2) :41 -77.
  • 7Blundo C, Santis A D, Herzberg A, et al. Perfectly Secure Key Distribu- tion for Dynamic Conference [ J ]. Information and Computation, 1995, 146(1) :1 -23.
  • 8Dai Hangyang, Xu Hongbing. Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix [ J]. IEEE Sensor Journal,2010,10 (8) :1139 - 1409.
  • 9Rasheed A, Mahapatra R. Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks [ J ]. IEEE Trans- actions on Parallel and Distributed Systems,2011,22 (1) :176-184.
  • 10龚文超,李小珉.q-composite密钥管理方案的研究与改进[J].电子测量技术,2010,33(6):115-117. 被引量:3

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部