期刊文献+

基于矩阵空间的分级密钥管理

Hierarchical Key Management Based on Matrix Space
下载PDF
导出
摘要 为提高无线传感器网络存储资源的利用率,同时增强网络的安全性,提出一种基于矩阵空间的分级密钥预分配管理方案。该方案采用LU矩阵子空间对节点逐次进行密钥分配,并在节点对密钥建立后,采用分级矩阵信息删除机制减少部分矩阵信息。实验仿真表明,在保证网络一定连通率的同时,该方案采用的分级矩阵信息删除机制不仅提升了节点的存储效率,而且逐步增强了无线传感器网络的安全性,网络节点最终能实现100%抗捕获攻击能力。 In order to improve the efficiency of the storage resource of wireless sensor networks,enhance security at the same time,this paper proposed a hierarchical key management based on matrix space.This scheme uses sub-space of LU matrix for successive key predistribution and uses removal mechanism to reduce some of the information of matrix of nodes after key establishment.Figures of simulation show that the proposed scheme provides better storage efficiency and better security through the removal mechanism.The security of network can up to 100%in the end.
出处 《计算机科学》 CSCD 北大核心 2012年第9期81-84,共4页 Computer Science
基金 国家自然科学基金(60673132) 佛山市科技发展专项资金项目(FZ2010030) 广东省重大科技专项项目(2009A080207008) 佛山市科技发展专项资金项目(FZ2009032) 广东省自然科学基金(9152800001000026)资助
关键词 无线传感器网络 密钥管理 矩阵空间 删除机制 Wireless sensor network Key management Matrix space Removal mechanism
  • 相关文献

参考文献11

  • 1袁珽,马建庆,钟亦平,张世永.基于时间部署的无线传感器网络密钥管理方案[J].软件学报,2010,21(3):516-527. 被引量:10
  • 2徐巧娟,郑燕飞,陈克非,朱博.基于LU矩阵空间的随机对密钥预分配方案[J].计算机应用,2009,29(7):1816-1819. 被引量:4
  • 3Ren Heng, Sun Xing-ming, Ruan Zhi-qiang, et al. An Efficient Scheme Against Node Capture Attacks using Secure Pairwise Key for Sensor Networks[J].Information Technology Journal, 2011,10(1):71-79.
  • 4余旺科,马文平,王淑华.基于部署信息的无线传感器网络密钥预分配[J].华中科技大学学报(自然科学版),2010,38(11):51-54. 被引量:5
  • 5Eschenauer L,Gligor V D. A Key Management Scheme for Dis- tributed Sensor Networks[C]// 9th ACM Conference on Corn-puter and Communications Security. New York, 2002 : 41 47.
  • 6Blom R. An optimal class of symmetric key generation systems [C] // Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Paris, 1984..335-338.
  • 7IM W, Deng J, Han Y S, et al. A pairwise key pre-distribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security, 2005,8 (2) : 228- 258.
  • 8Dai Hang-yang,Xu Hong-bing. Key predistribution approach in wireless sensor networks using LU matrix[J]. IEEE Sensors Journal, 2010,10(8) : 1399-1409.
  • 9Choi S J, Youn H Y. An Efficient Key Predistribution Scheme for Secure Distributed Sensor Network[C]//2005 IFIP Interna tional Conference on Embedded and Ubiquitous Computing. Na- gasak, iSpringe, 2005 : 1088-1097.
  • 10Zhu B, Zheng Y, Chen K, et al. Cryptanalysis of LU decomposi tion-based key pre-distribution scheme for wireless sensor net works[DB/OL], http://eprint, iacr. org/2008/411, pdf.

二级参考文献22

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2ESCHERAUER L, GLIGOR V D. A key management scheme for distributed sensor networks[ C]// Proceedings of 9th ACM Conference on Computer and Communications Security. New York: ACM,2002:41 -47.
  • 3CHAN H, PERRIG A, SONG D. Random key pre-distribution schemes for sensor networks[ C]// Proceedings of 2003 IEEE Symposium on Research in Security and Privacy. Washington, DC: IEEE Computer Society, 2003:197 -213.
  • 4BLUNDO C, De SANTIS A, HERBERG A. Perfectly-secure key distribution for dynamic conferences[ J]. Information and Computation, 1998, 146(1) : 1 -23.
  • 5BLOM R. An optimal class of symmetric key generation systems [ C]// Proceedings of Euro-crypt 84, LNCS 0209. Berlin : Springer-Verlag, 1984:335 - 338.
  • 6LIU D, NING P, Establishing pair-wise keys in distributed sensor networks[ C] // Proceedings of the 10 th ACM Conference on Computer and Communication Secnity. New York: ACM, 2003:27 - 31.
  • 7CHIOS J, YOUN H Y. An efficient key pre-distribution scheme for secure distributed sensor networks[ C]//The 2005 IFIP Intemational Conference on Embedded and Ubiquitious Computing. Nagasaki: Springer, 2005: 1088 - 1097.
  • 8PARK C W, CHIO S J, YOUN H Y. A noble key pre-distribution scheme with LU matrix for secure wireless sensor networks [ C ]// Proceedings of International Conference on Computational Intelligence and Security. Berlin: Springer, 2005:487 -499.
  • 9DAI T T, PATHAN A K, HONG C S. A resource-optimal key prcdistribution scheme with enhanced security for wireless sensor networks[ C]// Management of convergence networks and services, LNCS 4238, 2006:546 -549.
  • 10ZHU B, ZHENG Y, CHEN K, et al, Cryptanalysis of LU decomposition-based key pre-distribution schemes for wireless sensor net- works[ EB/OL]. [ 2008 - 11 -20]. http://eprint, iacr. org/2008/ 411. pdf.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部