期刊文献+

WSN中基于全同态加密的对偶密钥建立方案 被引量:3

Pair-wise key establishment for wireless sensor networks based on fully homomorphic encryption
下载PDF
导出
摘要 针对Guo等人基于排列的多对称多项式方案提出一种攻击方法,证明其方案未能突破容忍门限,并不能抵御大规模节点俘获攻击。通过引入全同态加密提出一种对偶密钥建立方案,使共享密钥计算过程在加密状态下完成,.阻止了敌手获得与多项式有关的信息,成功应对了大规模节点俘获攻击。提出一种全同态加密体制的间接实现方法,降低了方案的存储及计算复杂度。分析及实验表明本方案的存储、计算和通信开销完全满足无线传感器网络的要求。 An attack on the permutation-based multi-polynomial scheme exposed in the paper of Guo was proposed.The scheme couldn't frustrate the large-scale node capture attack was proved. A pair-wise key establishment scheme was pro- posed by introducing homomorphic encryption thought, which was used to protect polynomials and made all keys be estab- lished in encrypted state. Therefore, the large-scale node capture attack was thwarted because adversaries couldn't get any information about polynomials from the encrypted data used to establish keys. A method was presented to achieve fully homomorphic encryption indirectly, which used much less storage and computation resource than existing fully homomor- phic encryption. The analysis and experiment show our pair-wise key establishment scheme has very good performance in terms of storage, computation as well as communication and is suitable to wireless sensor networks with limited capability.
出处 《通信学报》 EI CSCD 北大核心 2012年第10期101-109,共9页 Journal on Communications
基金 国家自然科学基金资助项目(61170168 61170169)~~
关键词 无线传感器网络 对偶密钥建立 同态加密 密钥管理 WSN pair-wise key establishment homomorphic encryption key management
  • 相关文献

参考文献19

  • 1XIAO Y, RAYI V K, SUN B, et al. A survey of key management schemes in wireless sensor networks[J]. Computer Communications, 2007, 30(11-12):2314-2341.
  • 2LIU D G, NING E Location-based pairwise key establishment for static sensor networks[A]. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Fairfax, Virginia, USA, 2003.72-82.
  • 3ESCHENAUER L, GLIGOR V. A key management scheme for dis- tributed sensor networks[A]. The 9th ACM Conference on Computer and Communicalion Security[C]. Washington D C, USA, 2002. 41-47.
  • 4CHAN H W, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[A]. Proceedings 2003 Symposium on Security and Privacy[C]. Carnegie Mellon, PA, USA, 2003.197-213.
  • 5LIU D, NING E Establishing pairwise keys in distributed sensor networks[A]. The 10th ACM Conference on Computer and Commu- nications Security[C]. Washington D C, USA, 2003.52-61.
  • 6MARTIN K, PATERSON M. Key predis -tribution for homogeneous wireless sensor networks with group deployment of nodes[J]. ACM Transactions on Sensor Networks, 2010,7(2): 1 - 18.
  • 7LIU D, NING P, DU W. Group-based key pre-distribution in wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2008, 4(2): 11-20.
  • 8ZHANG W, TRAN M, ZHU S, et al. A random perturbation-based scheme for pairwise key establishment in sensor networks[A]. Pro- ceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing[C]. New York, NY, USA, 2007.90-99.
  • 9GUO S, LEUNG V, QIAN Z Z. A permutation-based multi- polyno- mial scheme for pairwise key establishment in sensor networks[A]. IEEE International Conference on Communications (ICC)[C]. Cape Town, South Africa, 2010.1-5.
  • 10ALBRECHT C, HALEVI G, KATZ J. Attacking cryptographic schemes based on perturbation polynomials[A]. ACM Conference on Computer and Communication Security[C]. Chicago, IL, USA, 2009.1-8.

同被引文献41

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2孙中伟,冯登国,武传坤.基于加同态公钥密码体制的匿名数字指纹方案[J].软件学报,2005,16(10):1816-1821. 被引量:9
  • 3刘永亮,高文,姚鸿勋,黄铁军.Aydos等基于椭圆曲线密码学无线认证协议的安全性[J].计算机研究与发展,2006,43(12):2076-2081. 被引量:3
  • 4ZHU W T, GAO F, XIANG Y. A secure and efficient data ag- gregation scheme for wireless sensor networks [J]. Concurrency & computation practice & experience, 2011, 23 (12) : 1414- 1430.
  • 5OZDEMIR S, XIAO Y. Integrity protecting hierarchical con- cealed data aggregation for wireless sensor networks [J]. Com- puter networks, 2011, 55(8): 1735-1746.
  • 6BELLARE M, KOHNO T, SHOUP V. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentia- tion [C]// Proceedings of 2006 13th ACM Conference on Com- puter and Communications Security. Alexandria: ACM, 2006: 380-389.
  • 7CASTELLUCCIA C, MYKLETUN E, TSUDIK G. Efficient ag- gregation of encrypted data in wireless sensor networks [C]// Proceedings of 2005 International Conference on Mobile and Quitous Systems. Washington, D. C.:IEEE, 2005 : 109-117.
  • 8KATZ J, LINDELL A Y. Aggregate message authentication codes [C]// Proceedings of 2008 Cryptopgraphers Track at the RSA Conference on Topics in Cryptology. San Francisco: Springer-Verlag, 2008 : 155-169.
  • 9CAMPAGNA M J, BROWN D R L, EBEI N M N. Key agree- ment using a key derivation key: US 9088408 [P]. 2014-03-22.
  • 10PETER S, WESTHOFF D, CASTELLUCCIA C. A survey on the encryption of convergecast traffic with in-network processing [J]. IEEE transactions on dependable & secure computing, 2010, 7(1): 20-34.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部