期刊文献+

一种基于二次型的无线传感器网络密钥管理方案 被引量:6

A Key Management Scheme Based on Quadratic Form for Wireless Sensor Network
下载PDF
导出
摘要 针对现有的基于多项式的密钥预分配管理方案受限于节点间密钥共享率和网络连通率等问题,文中提出了一种基于二次型的无线传感器密钥管理方案.该方案突破现有二元t次对称多项式建立共享密钥的思路,引入多元非对称二次型多项式,利用二次型特征值与特征向量之间的关系,分析证明二次型正交对角化的特性,生成密钥信息,节点则通过交换密钥信息实现身份认证,生成与邻居节点之间独立唯一的会话密钥.性能分析表明,与现有的密钥管理方案相比,方案在抗俘获性、连通性、可扩展性、通信开销和存储开销上有较大的改进. This paper presents a key management scheme based on quadratic form polynomial for wireless sensor network (WSN) for the problems that some existing key pre-distribution schemes are limited in key sharing and network connectivity probability between neighbor nodes. It beyonds the current ideas for establishing shared key based on quadratic symmetric polynomial and presents the multiple asymmetric quadratic form polynomial, and analyzes the orthogonal diagonalization properties of quadratic form to generate the key information by the relationship between eigenvalues and eigenvectors of the quadratic form, the nodes could achieve identification and generate the unique session keys between the neighbor nodes through exchanging the key information. Compared to some existing key pre-distribution schemes, the analysis of performance show that this scheme could resist captive, have good scalability and connectivity, and have a lower storage cost, a lower communication overhead.
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第2期214-219,共6页 Acta Electronica Sinica
基金 国家科技支撑计划(No.2011BAJ03B13)
关键词 无线传感器网络 密钥管理 二次型 特征值 特征向量 wireless sensor network key management quadratic fonn eigenvalues eigenvectors
  • 相关文献

参考文献15

  • 1Xiaojiang Du, et al. Security in wireless sensor networks[J]. IE.FE Waveless Communications, 2008,15(4) :60 - 66.
  • 22/hang Yuan, Shen Yongluo, Lee Sangkeun. A cluster-based group key management scheme for wireless sensor networks [A] 1-Proceedings of the 12th International Asia Pacific Web Conference [ C]. APWeb, 2010.386 - 388.
  • 3李凤华,王巍,马建峰.适用于传感器网络的分级群组密钥管理[J].电子学报,2008,36(12):2405-2411. 被引量:10
  • 4彭清泉,裴庆祺,马建峰,庞辽军.无线传感器网络中自治愈的群组密钥管理方案[J].电子学报,2010,38(1):123-128. 被引量:9
  • 5Eschenauer L, Gligor V. A key management scheme for dis- tributed sensors networks [ A]. Proceedings of the 9th ACM Conference on Computer and Communications Security [ C]. New York, USA: ACM Press,2002.41 - 47.
  • 6Chaa Haowen, Perrig A, Song D. Random key pre-distdbution schemes for sensor network [ A ]. Proceedings of the reEF. Symposim On Security and Privacy [ C ]. Washington DC, USA: IEEE Press,2003. 197 - 213.
  • 7阎军智,李凤华,马建峰.一种无状态的传感器网络密钥预分配方案[J].电子学报,2009,37(10):2199-2204. 被引量:2
  • 8杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 9Liu Donggang, Ning Peng. Establishing pair-wise keys in dis- Iributed sensor networks [ A]. Prtr, eextings of the 10th ACIVI Conference on Compur an0 Commcaon Sun C]. New York, USA: ACM Press,2003.52 - 61.
  • 10Chorzempa M, Park J M, Eltoweissy M. SECK: Survivable and efficient clustered keying for wireless sensor networks [ A ]. Proceedings of the IF, E-, International Performance, Computing and Communicaliom Conference (Phoenix) [ C ]. USA: IEE, F, Press,2005.453 - 458.

二级参考文献42

  • 1J H Son, J S Lee, S W Seo. Energy efficient group key management scheme for wireless sensor networks [ A ]. In Proceedings of the 2rid International Conference on Communication Systems Software and Middleware [ C]. Bangatore, India: IEEE Press,2007.1 - 9.
  • 2B Panja, S K Madria, B Bhargava. Energy and communication efficient group key management protocol for hierarchical sensor networks[A] .In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing[ C ]. Taichung, Taiwan: IEEE Press, 2006.384 - 393.
  • 3Z Qingguang, C Yanling, L Juan. A lightweight key management protocol for hierarchical sensor networks[A] .In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies [ C ]. Taiwan: IEEE Press, 2006. 379 - 382.
  • 4M Eltoweissy, M H Heydari, L Morales, et al. Combinatorial optimization of group key management[J]. Jotlmal of Network and Systems Management: Special Issue on Network Security, 2004,12(1 ) :33 - 50.
  • 5J M Kim,J S Cho,S M Jung,et al.An energy-efficient dynamic key management in wireless sensor networks [ A ]. In Proce.edings of the 9th International Conference on Advanced Communication Technology [ C ]. Phoenix Park, Korea: IEEE Press,2006.2148 - 2153.
  • 6M Moharram, R Mukkamala, M Eltoweissy. TKGS: Threshold- based key generation scheme for wireless Ad Hoc networks [ A]. In Proceedings of the IEEE International Conference on Computer Communications and Networking [ C ]. Chicago, IL, USA: IEEE Press, 2004.31 - 36.
  • 7R Mukkamala, M Moharram, M Eltoweissy. A novel architecture for secure group communication in wireless Ad-Hoc net- works with application-level multicast [ A ]. In Proceedings of the 3rd International Trusted Intemet Workshop[ C 1. Bangalore, India: 2004.
  • 8M F Younis, K Ghumman, M Eltoweissy. Location-aware combinatorial key management scheme for clustered sensor net-works[ J ]. IEEE Transactions on Parallel and Distributed Systems, 2006,17 ( 8 ) : 865 - 882.
  • 9Z Xinliang, H Chin-Tser,M Manton. Chinese remainder theorem based group key management [ A ]. In Proceedings of the 45th ACM Southeast Conference ( ACMSE 2007 ) [ C ]. Winston-Salem, North Carolina, USA: ACM Press, 2007. 266 - 271.
  • 10D Naor, M Naor, J Lotspiech. Revocation and tracing schemes for stateless receivers [ A ]. In Proceedings of Advances in Cryptology - CRYPTO 2001 [ C ]. Santa Barbara, California, USA: Springer, 2001.41 - 62.

共引文献76

同被引文献46

  • 1俞经善,王晶,杨川龙.基于ECC和AES相结合的加密系统的实现[J].信息技术,2006,30(2):44-46. 被引量:6
  • 2卿利,朱清新,王明文.异构传感器网络的分布式能量有效成簇算法[J].软件学报,2006,17(3):481-489. 被引量:159
  • 3沈波,张世永,钟亦平.无线传感器网络分簇路由协议[J].软件学报,2006,17(7):1588-1600. 被引量:267
  • 4李成法,陈贵海,叶懋,吴杰.一种基于非均匀分簇的无线传感器网络路由协议[J].计算机学报,2007,30(1):27-36. 被引量:371
  • 5AKYILDIZ I F,SU W,S Y,et al.A survey on sensor networks[J].IEEE Communications Magazine,2002,40(8):102-114.
  • 6ROMAN R,ALCARAZ C.Applicability of public key infrastruc-tures in wireless sensor networks[M]// Public Key Infrastructure.Berlin:Springer-Verlag,2007:313-320.
  • 7ESCHENAUER L,GLIGOR V D.A key-management scheme fordistributed sensor networks[C]// Proceedings of the 9th ACM Con-ference on Computer and Communications Security.New York:ACM Press,2002:41-47.
  • 8CHAN H,PERRIG A,SONG D.Random key predistributionschemes for sensor networks[C]// Proceedings of the 2003 IEEESecurity and Privacy.Washington,DC:IEEE Computer Society,2003:197-213.
  • 9BLOM R.An optimal class of symmetric key generation systems[C]// Proceedings of the EUROCRYPT 1984 Workshop on Ad-vances in Cryptology:Theory and Application of CryptographicTechniques.New York:ACM Press,1985:335-338.
  • 10DU W,DENG J,HAN Y S,et al.A pairwise key predistributionscheme for wireless sensor networks[J]ACM Transactions on Infor-mation and System Security,2005,8(2):228-258.

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部