期刊文献+

一种抗LU攻击的传感器网络密钥预分配方案 被引量:1

Key Pre-Distribution Scheme for Wireless Sensor Network against LU Attack
下载PDF
导出
摘要 现有的基于矩阵LU分解的传感网密钥预分配方案容易遭受LU攻击.针对该问题,采用扰动技术干扰LU分解的结果矩阵,并结合随机共享比特串截取方法,使得共享密钥难以计算,进而提出了一种抗LU攻击的传感器网络密钥预分配方案.通过有效调节噪声因子大小、密钥组件长度、密钥组件计算轮数等参数,节点仅需预分配一定数量的密钥材料,就能以较高的安全概率建立配对密钥.经过与典型方案的对比分析与讨论,结合可行性分析,证明了所提方案不仅适用于传感器网络,更能够有效抵抗窃听攻击、LU攻击和节点捕获攻击. Existing key pre-distribution schemes based on LU decomposition are suffering from LU attack. In order to solve this problem, perturbation technology is an effective method to break the relationship between result matrices of LU decomposition, and random cutting method of shared bit-string is also introduced to enhance the difficulty of breaking share keys. Based on these two methods, a new pair-wise key pre-distribution scheme against LU attack is proposed. Nodes only need to preload a few of key materials and can establish pair-wise keys with high secu- rity by choosing proper parameters, such as the noise factor, the length of key component, the total number of rounds. The contrastive analysis and feasibility analysis show that our proposed scheme is suitable for wireless sensor networks and resistant to eavesdropping attack, LU attack and node capture attack.
出处 《计算机学报》 EI CSCD 北大核心 2013年第6期1155-1167,共13页 Chinese Journal of Computers
基金 国家自然科学基金(61170241) 博士后科研人员落户黑龙江科研启动资助金项目(LBH-Q10141) 黑龙江省教育厅科学技术研究项目(12513049)资助~~
关键词 传感器网络 密钥预分配 对密钥 LU分解 扰动技术 wireless sensor networks key pre-distribution pair-wise key LU decomposition perturbation technology
  • 相关文献

参考文献20

  • 1Fanian A, Berenjkoub M,Saidi H, Gulliver T A. A scalableand efficient key establishment protocol for wireless sensornetworks//Proceedings of the 2010 IEEE Globecom Work-shop on Web and Pervasive Security. Miami, FL, USA,2010: 1533-1538.
  • 2Eschenauer L,Gligor V D. A key-management scheme fordistributed sensor networks//Proceedings of the 9 th ACMConference on Computer and Communications Security.Washington, DC, USA, 2002: 41-47.
  • 3Blom R. An optimal class of symmetric key generationsystems//Proceedings of the EUROCRYPT,84 Workshop onAdvances in Cryptology: Theory and Application of Crypto-graphic Techniques. Paris, France, 1984: 335-338.
  • 4Du Wen-Liang, Deng Jing, Han Y S,Varshney P K, Katz J,Khalili A. A pairwise key predistribution scheme for wirelesssensor networks. ACM Transactions on Information andSystem Security(TISSEC),2003,8(2): 228-258.
  • 5Choi S J,Youn H Y. An efficient key pre-distributionscheme for secure distributed sensor network//Proceedingsof the 2005 IFIP International Conference on Embedded andUbiquitous Computing. Nagasaki, Japan, 2005:1088-1097.
  • 6Park C W,Choi S J, Youn H Y. A noble key predistributionscheme with LU matrix for secure wireless sensor net-works/ /Proceedings of the 2005 International Conference onComputational Intelligence and Security. Xi,an,China,2005: 494-499.
  • 7Choi S J,Youn H Y. MKPS: A multi-level key pre-distribu-tion scheme for secure wireless sensor networks//Proceedingsof the 12th International Conference on Human ComputerInteraction. Beijing, China, 2007: 808-817.
  • 8Pathan A K,Dai T T,Hong C S. An efficient LU decompo-sition-based key pre-distribution scheme for ensuring securityin wireless sensor networks//Proceedings of the 6th IEEEInternational Conference on Computer and InformationTechnology. Seoul, Korea, 2006: 227-227.
  • 9Chen N, Yao J B,Wen G J. An improved LU matrix keypre-distribution scheme for wireless sensor networks//Proceedings of the 2008 International Conference onAdvanced Computer Theory and Engineering. Phuket Island,Thailand,2008: 503-507.
  • 10Dai H Y,Xu H B. Key predistribution approach in wirelesssensor networks using LU matrix. IEEE Sensors Journal,2010,10(8): 1399-1409.

同被引文献26

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 3Tan C C, Sheng B, and Li Q. Secure and severless RFID authen- tication and search protocols[ C ] //Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communi- cations, New York :IEEE ,2007:24 -29.
  • 4Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, etal. Se- cure tag search in RFID systems using mobile readers [ J ]. IEEE Transactions on Dependable and Secure Computing ,2014, (99) :.
  • 5Juels A,Pappu R. Squealing Euros:Privacy Protection in RFID- Enabled Banknotes [ C ]. Financial Cryptography. Springer Ber- lin Heidelberg,2003 : 103 -121.
  • 6Go|le P, Jakobsson M, Juels A. Syverson universal re-eneryption for mixnets [ C ]//The Cryptographers' Track at the RSA Confe- rence 2004, San Francisco, CA, USA ,2004 : 163 -178.
  • 7Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hos- seinzadeh. A novel mutual RFID authentication protocol with low complexity and high security[J]. International Journal of Modem Education and Computer Science ( IJMECS ) , 2014,6 ( 1 ) : 17 - 24.
  • 8Hua Man, Li Yanling. Security authentication protocol analysis and security issue of RFID [ C ]Jj2011 2nd International Confe- rence on Management Science and Engineering, MSE 2011, En- gineering Technology ,2011.
  • 9Blom R. An optimal class of symmetric key generation system- s[ C]//Proc of the Eurocrypt84 Workshop on Advances in Cryp- tology: Theory and Application of Crypto-graphic Techniques, Paris, France, 1984:335 -338.
  • 10Dai H Y, Xu H B. Key predistribution approach in wireless sensor networks using LU matrix [ J]. IEEE Sensors Journal, 2010, 10(8) :1399 -1409.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部