期刊文献+

异构分组无线传感器网络密钥管理机制 被引量:1

Key management scheme for heterogeneous clustered wireless sensor networks
原文传递
导出
摘要 针对异构分组无线传感器网络结构和应用特点,在加密通信中使用组密钥和对密钥.组密钥使用基于双向散列链自愈组密钥分发方法按会话进行更新.网络中有直接通信需求的节点间都以双线性对方式建立对密钥.对密钥与组密钥相结合,以非交互方式按会话进行更新.分析表明:方案支持节点插入和撤销,安全高效,资源开销合理,适用于无线传感器集中式管理网络. Group key and pair-wise key were used in key management of heterogeneous cluster wireless sensor networks based on the structure and applications of the network.The group keys would be updated each session according to dual directional hash chains based self-healing group key distribution scheme.Each pair of nodes that needs to communicate with the other established pair-wise key in the manner of bilinear pairings.Pair-wise keys would be also updated each session together with group keys in a non-interactive way.The analysis shows that the scheme supports node addition and revocation.And its good efficiency,high security performance and perfectly acceptable resource overhead make it attractive for centralized management of wireless sensor networks.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第4期19-22,42,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家重点基础研究发展计划资助项目(2011CB302906)
关键词 密钥管理 异构网络 无线传感器网络 组密钥 对密钥 双向散列链 双线性对 key management heterogeneous networks wireless sensor networks group key pair-wise key dual directional hash chains bilinear pairings
  • 相关文献

参考文献2

二级参考文献32

  • 1YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3胡华平,胡光明,董攀,陈新.大规模移动自组网络安全技术综述[J].计算机研究与发展,2007,44(4):545-552. 被引量:13
  • 4STADDON J, MINER S, FRANKLIN M, et al. Self-healing key distribution with revocation[A]. Proceedings of the 2002 IEEE Symposium on Research in Security and Privacy (S&P'02)[C]. Berkeley, CA, 2002. 241-257.
  • 5LIU D G, NING P, SUN K. Efficient self-healing group key distribution with revocation capability[A]. Proceedings of the 10th ACM Conference on Computer and 2003)[C]. Washington, DC, United Communications Security (CCS States, 2003.231-240.
  • 6BLUNDO C, D'ARCO P, LISTO M. A new self-healing key distribution scheme[A]. Proceedings of the 8th IEEE Symposium on Computers and Communications (ISCC'2003)[C]. Antalya, Turkey, 2003. 803-808.
  • 7BLUNDO C, D'ARCO P, LISTO M. Design of self-healing key distribution schemes [J]. Designs, Codes and Cryptography. 2004, 32(1-2): 15-44.
  • 8BLUNDO C, D'ARCO P, DE S A. On self-healing key distribution schemes[J]. IEEE Transactions on information Theory, 2006, 52(12) :5455-5467.
  • 9HONG D, KANG J S. Art efficient key distribution scheme with self-healing property[J]. IEEE Communications Letters, 2005, 9(8): 759-761.
  • 10SAEZ G, On threshold self-healing key distribution schemes[A]. Proceedings of Cryptography and Coding 2005[C]. Cirencester, United Kingdom, 2005. 340-354.

共引文献7

同被引文献10

  • 1Tian B, Han S, Parvin S, et al. Self-healing key distribution schemes for wireless networks: a.survey[J]. The Computer Journal, 2011, 54(4): 449-569.
  • 2He Weibo, Nguyen H. PDA: Privacy-preserving data aggregation in wireless sensor networks[C]//Proc of the 26th IEEE International Conference on Computer Communications. Washington D C. USA: 2007: 2045-2053.
  • 3Girao J, Westhoff D, Schneider M. CDA: Concealed data aggregation for reverse multicast traffic in Wireless Sensor Networks[C]//Proc of the 40th International Conference on Communications Seoul, Korea, 2005: 3044-3049.
  • 4Zhang W S, Wang C, Feng T M. GPS: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data[C]//Proc of sixth Annual IEEE International Conference on Pervasive Computing and Communications. Washington: IEEE Computer Society Press, 2007: 179-184.
  • 5Heinzelman W B, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless micro-sensor networks[C]//Proc 33rd Hawaii Int Conf System Sciences (HICSS), Maul, HI, Jan, 2000: 4-7.
  • 6Morain F. Implementing the asymptotically fast version of the elliptic curve primality proving algorithm[J]. Mathematics of Computation, 200"/, 76: 493-505.
  • 7Laurent Eschenauer, Gligor Virgil D. A Key-Management Scheme for Distributed Sensor Net- works[C]//Proceedings of the 9th ACM Conference on Computer and Communication Security, 2002: 41-47.
  • 8Chan H, Perrig A, Song D. Random Key Pre-distribution Schemes for Sensor Networks[C]//Pro- ceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, 2003: 197-213.
  • 9胡运松,单洪,马涛.异构无线传感器网络组密钥管理方案设计[J].计算机工程,2011,37(1):149-150. 被引量:2
  • 10杨庚,王安琪,陈正宇,许建,王海勇.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800. 被引量:58

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部