期刊文献+

HDS-LEACH:一种基于散列链的动态密钥管理多跳安全路由协议 被引量:3

HDS-LEACH:a Hash-chain Based Dynamic Key Management Secure Multi-hop Routing Protocol in WSNs
下载PDF
导出
摘要 主要研究传感器网络安全的能量高效的层簇式路由协议机制.在深入分析现有LEACH协议所面临的安全威胁的基础上,提出一种动态的,基于散列链的分区自治式的层簇式安全路由协议HDS-LEACH.其核心思想是,在层簇式路由协议中引入分区,建立多跳路径;在每轮簇首选举之后为每个簇头节点随机从散列链组成的密钥池中选取q个链密钥,其它节点根据链密钥用单向哈希函数和伪随机函数派生出相互间通信的密钥,同时在多跳路由中融入动态密钥管理,使协议适应无线传感器网络动态变化的拓扑结构,增强了协议的可扩展性,另一方面,分区自治的多跳路由,避免了远离基站的节点直接与汇聚节点通信,均衡节点能耗.仿真实验表明,改进的路由协议HDS-LEACH大大减少了因网络攻击而造成的数据流失,增强了抗攻击能力,显著降低了网络能耗,延长了网络生存时间. This paper focuses on the performance enhancement of the typical LEACH protocol in security and energy efficiency in wireless sensor networks.Considering security threats faced by the existing LEACH protocol,we propose a novel dynamic hierarchical cluster-based zone-spanned secure multi-hop routing protocol on the basis of hash chain,i.e.HDS-LEACH.The main idea is to introduce subregion to build multi-hop route,and after a round of cluster-head selection,each cluster-head is randomly assigned with q chain secret keys from the key pool which consists of a series of hash chain.The other nodes derive communication key according to hash function and pseudo random function.Then we introduce a dynamic key management scheme in the multi-hop routing protocol to provide communication protection.The HDS-LEACH enables,on the one hand,the scalability of routing mechanism and adaptation to the dynamic network topology,on the other hand,balanced energy consumption by means of partition autonomy and avoiding long-distance communication between sensor nodes and sink node.Our simulation experiments demonstrate that the proposed DZS-LEACH may enhance defense ability and reduce data loss caused by network attacks.Meanwhile,the energy consumption is reduced significantly and the network lifetime is extended.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第11期2446-2452,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60673185 61073197)资助 江苏省自然科学基金项目(BK2010548)资助 南京大学计算机软件新技术国家重点实验室开放课题项目(KFKT2010B08)资助
关键词 传感器网络安全路由协议 分区自治 散列链 动态密钥管理 均衡能耗 secure routing in wireless sensor networks partition autonomy hash chain dynamic keys balanced energy consumption
  • 相关文献

参考文献2

二级参考文献29

  • 1Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002, 38(4) : 393-422
  • 2Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing in wireless sensor networks//Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS). Providence, Rhode Island, USA, 2003: 32-39
  • 3Lazos L, Poovendran R. SeRLoc: Secure range-independent localization for wireless sensor networks//Proceedings of the ACM Workshop on Wireless Security (WISE). Philadelphia, PA, USA, 2004:21-30
  • 4Przydatek B, Song D, Perrig A. SIA.. Secure information aggregation in sensor networks//Proceedings of the 1st Inter- national Conference on Embedded Networked Sensor Systems. California, USA, 2003:255-265
  • 5Crossbow Technology, Inc. MICA2: Wireless measurement system.
  • 6Koc K C. High-speed RSA implementation. RSA Laboratories: Technical Report TR201, 1994
  • 7Neuman B C, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications, 1994, 32 (9) : 33-38
  • 8Chan H, Perrig A, PIKE: Peer intermediaries for key establishment in sensor networks//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Miami, FL, USA, 2005:524-535
  • 9Carntepe S A, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks//Proceedings of the Computer Security ESORICS. Sophia Antipolis, French Riviera, France, 2004:293-308
  • 10Eschenauer L, Gligor V. A key management scheme for distributed sensor networks//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, USA, 2002:41-47

共引文献26

同被引文献35

  • 1杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010.
  • 2郑军、张宝贤.无线传感器网络技术[M].北京:机械工业出版社.2012.
  • 3Estrin D,Pisterk C D.Connecting the physical word with pervasive networks[J].IEEE Pervasive Computing,2002,1(1):59-69.
  • 4Carman D W,Kruus P S,Matt B J.Constraints and approaches for distributed sensor security(final)[R].[S.l.]:NAI Labs,2000.
  • 5Anjum F,Mouchtaris P.Security for wireless ad hoc networks[M].[S.l.]:Wiley-Interscience,2007.
  • 6Adrian P,John S,David W.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57.
  • 7Deng J,Han R,Mishra S,et al.Intrusion-tolerant routing in wireless sensor networks[C]//23rd IEEE International Conference on Distributed Computing Systems(ICDCS'2003),2003.
  • 8Koc K C,High-speed RSA implementation,TR2011994[R].[S.l.]:RSA Laboratories,1994.
  • 9Neuman B C,Ts'o T.Kerberos:an authentication service for computer networks[J].IEEE Communications Magazine,1994,32(9):33-38.
  • 10Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[C]//Proc of the 9th ACM Conf on Computer and Communications Security,2002.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部