期刊文献+

安全的无线传感器网络密钥预分配方案 被引量:4

Security key pre-distribution scheme for wireless sensor networks
下载PDF
导出
摘要 密钥管理是无线传感器网络(WSN)安全的核心问题。基于二元对称多项式的随机密钥预分配方案为节点的通信提供了一种安全机制,但这些方案都存在"t-security"问题,很难抵制节点的捕获攻击。为了更好地解决该问题,提高网络的安全阈值及节点的抗捕获能力,采用可转化三元多项式代替二元对称多项式来建立节点间通信,并引入密钥分发节点进行分簇网络密钥分发。同时,由于对节点密钥采用单向Hash函数进行处理,提高了密钥破解难度。分析结果表明,该方案提高了网络的安全性及节点的抗毁性与可扩展性,降低了传感器普通节点的存储与计算开销。 Key management is the core security issue in Wireless Sensor Network (WSN). Based on bivariate symmetric polynomials of random key pre-distribution scheme, a safety mechanism was provided for the nodes communication; however, it has the "t-security" problem and vulnerable to the node capture attack. In order to well solve this problem, and to improve the safety threshold value of network and node ability of anti-trapping, the authors used the convertible ternary polynomial instead of binary polynomial to establish inter-node communication and introduce the key distribution node to do key distribution of the cluster network. The new scheme improved the network anti-trapping ability. Moreover, decoding the sensor node key became almost impossible because of the use of the one-way Hash function. The analytical results show that this scheme has higher anti-destruction ability, scalability and security, and also reduces the overhead of storage and computation among common sensor nodes.
出处 《计算机应用》 CSCD 北大核心 2013年第7期1851-1853,1874,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61063041 61202395 61163038 61262057) 甘肃省自然科学基金资助项目(1208RJZA255) 教育部新世纪优秀人才计划项目(NCET-12-0620) 人力资源与社会保障部留学回国人员择优资助项目
关键词 无线传感器网络 可转化三元多项式 HASH函数 分簇 密钥预分配 Wireless Sensor Network (WSN) convertible ternary polynomial Hash function clustering key pre-distribution
  • 相关文献

参考文献12

  • 1AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey[ J]. Computer Networks, 2002, 38(4) : 393 -422.
  • 2MAO GUOQIANG, FIDAN B, ANDERSON B D O. Wireless sensor network localization techniques [ J]. IEEE Computer Networks, 2007, 51(1) : 2529 - 2523.
  • 3YICK J, MUKHERJEE B, GHOSAL D. Wireless sensor network survey[ J]. IEEE Computer Networks, 2008, 52 (12) : 2292 - 2300.
  • 4NEUMAN B C, TSO T. Kerberos: an authentication service for computer net-works[ J]. IEEE Communications, 1994, 32(9) : 33 -38.
  • 5ESCHENAUER L, GLIGOR V D. A key management scheme for distributed sensor networks[ C]//Proceedings of the 9th ACM Con- ference on Computer and Communications Security. New York: ACM Press, 2002:41 -47.
  • 6CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[ C]/! Proceedings of IEEE 2003 Sym- posium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003:197 -213.
  • 7BLUNDO C, SANTIX A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [ C ]// Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Spring-Verlag, 1992:471-486.
  • 8LIU DONGGANG, NING PENG. Location-based pairwise key es- tablishments for static sensor networks[ c]/! Proceedings of the 1 stACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003:72 -82.
  • 9HUANG D, MEHTA M, MEDHI D, et al. Location aware key man- agement scheme for wireless sensor networks[ C]// Proceedings of the ACM Workshop on Security for Ad Hoc and Sensor Networks. New York: ACM Press, 2004:29 -42.
  • 10DU W L, DENG J, HAN Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge[ C]//Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Com- munication Societies. Washington, DC: IEEE Computer Society, 2004:62 - 77.

二级参考文献9

同被引文献41

  • 1陈虹旭,李晓坤,徐龙,董潍赫,刘清源,付文香.泛在电力物联网的多项式密钥管理算法研究[J].智能计算机与应用,2020,10(8):140-143. 被引量:1
  • 2PENG N,LIU D. Multilevel uTESLA:a broadcast authentication system for distribution sensor networks[J].ACM Transactions on Embeded Computing Systems,2004,(04):800-836.
  • 3RUAN N,HORI Y. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of things[A].Washington,DC:IEEE Computer Society,2012.60-65.
  • 4VIJAYALAKSHMI B. A zero-knowledge authentication for wireless sensor networks based on congruence[A].Washington,DC:IEEE Computer Society,2011.94-99.
  • 5MANIVANAN D,VIJAYALAKSHMI B,NEELAMEGAM P. An efficient authentication protocol based on congruence for wireless sensor networks[A].Washington,DC:IEEE Computer Society,2011.549-554.
  • 6CHANG Q,ZHANG Y,QIN L. A node authentication protocol based on ECC in WSN[A].Washington,DC:IEEE Computer Society,2010.606-609.
  • 7LI Y,LI J,REN J. Providing hop-by-hop authentication and source privacy in WSN[A].Piscataway,NJ:IEEE Press,2012.3071-3075.
  • 8KHAN S U,KHAN R. An efficient authentication and key establishment scheme for heterogeneous sensor networks[A].Piscataway,NJ:IEEE Press,2011.1-6.
  • 9DAS M L. Two-factor user authentication in wireless sensor networks[J].{H}IEEE Transactions on Wireless Communications,2009,(03):1086-1090.
  • 10KUMAR P,SAIN M,LEE H J. An efficient two-factor user authentication framework for wireless sensor networks[A].Piscataway,NJ:IEEE Press,2011.574-578.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部