期刊文献+

基于逻辑邻居树的资源受限WSN安全群组管理方案 被引量:1

Resource-limited Secure Group WSN Management Scheme Based on LNT
下载PDF
导出
摘要 针对无线传感器网络群组密钥更新过程中通信、计算、存储开销过重以及密钥更新延迟时间过长,重放攻击等安全问题,提出了一种新的资源受限安全群组密钥管理方案,该方案基于逻辑邻居树原理生成多个逻辑群组,每个逻辑群组通过群组控制者维护群组内密钥更新以及管理,无需群组外节点路由支持,同时具有保密性、鲁棒性等特点。分析比较结果表明,新方案通过构建邻居树减少了群组控制者通信、计算、存储方面开销,缩短了群组控制者密钥更新延迟,解决了恶意节点重放攻击等安全问题. In wireless sensor group, the cost o{ key update process communication, computation and storage in the key update process is excessive, the delay time is too long and also prone to replay attack etc. Conse- quently, a new resource-limited secure group key management scheme is put forward. This scheme is based on logical neighbor tree principle which generates more logical groups, and each logical group maintains the group key update and management by the group controller without the group node routing support,and at the same time, it has characteristics of confidentiality, robustness etc.. Analysis and comparison results show that the new scheme reduces the cost of the communication, computation and storage of the group controller, shortens the key update delay and solves the malicious nodes replay attack issues by implemen- ting INT construction.
出处 《兰州交通大学学报》 CAS 2013年第3期49-55,共7页 Journal of Lanzhou Jiaotong University
基金 国家自然科学基金项目(61261029) 甘肃省科技支撑计划项目(1204GKCA051) 高等学校基本科研业务费项目(212090)
关键词 无线传感器网络 安全群组管理 逻辑邻居树 wireless sensor network secure group management logical neighbor tree
  • 相关文献

参考文献11

  • 1周雁,王福豹,黄亮,李晓辉.无线传感器执行器网络综述[J].计算机科学,2012,39(10):21-25. 被引量:13
  • 2Rafaeli S, Hutchison D. A survey of key management for secure group communication[J]. ACM Computing Surveys, 2003,35(3) 309-329.
  • 3Pitipatana S, Nirwan A. Security services in group communications over wireless infrastructure mobile ad hoc and wireless sensor networks[J]. IEEE Computer Society, 2007,14(5) : 8-20.
  • 4Dong H M, Agrawal D P. Threshold and identity-based security scheme for wireless ad hoe networks [J -]. Ad Hoc Networks, 2004,2(3) : 107-111.
  • 5Perk C, Royer E. Ad-hoc on-demand distance vector routing[-J]. Mobile Computing Systems and Applica- tions, 1999,4(3) :90-100.
  • 6税国军,沈树群.多路径DSR和AODV路由协议性能研究[J].计算机工程,2009,35(6):23-25. 被引量:5
  • 7Wong C K,Gouda M,Lam S S. Secure group communi- cations using key graphs[J']. IEEE/ACM Trans, 2000, 8(1) : 16-30.
  • 8Son J H, Lee J S. Topological key hierarchy for energy- efficient group key management in wireless sensor net- works[J-]. Wireless Personal Communications, 2010,52 (2) :359-382.
  • 9Cheikhrouhou O,Koubaa A, Gaddou O. Riseg a logical ring based secure group communication protocol for wireless sensor networks[J. The International Confer- ence on Wireless and Ubiquitous Systems, 2010,3 (6): 234-239.
  • 10Lasassmeh S,Conmd ]. Time synchronization in wire- less sensor networks: A survey rJ], computer net- works journals, 2010,18(4) : 242-245.

二级参考文献28

  • 1张丽,刘有源,邓莹,李文锋.无线传感执行网络中协作机制的研究[J].交通与计算机,2007,25(1):48-51. 被引量:4
  • 2Johnson D B, Maltz D A. The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks(DSR)[EB/OL]. (2004-07-19). http://www. ietf.org/internet-drafts/draft-ietf-manet-dsr- 10.txt.
  • 3Perkins C, Royer E M, Das S. Ad-hoc On-demand Distance Vector (AODV) Routing[EB/OL]. (2003-02-17). http://www.ietf.orglinter net-drafts/draft-ietf-manet-aodv-13.txt.
  • 4Akyildiz I F. A Survey on Wireless Mesh Networks[J]. IEEE Communications Magazine, 2005, 43(9): 23-30.
  • 5Nasipuri A, Casta R, Das S R. Performance of Multi-path Routing for On-demand Protocols in Mobile Ad-hoc Networks[J]. Mobile Networks and Applications, 2001, 6(4): 339-349.
  • 6Li Xuefei, Cuthbert L. Node-disjointness Based Multi-path Routing for Mobile Ad-hoc Networks[C]//Proc. of the ACM International Workshop on Performance Evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks. Venezia, Italy: ACM Press, 2004.
  • 7Cai Zi-xing, Ren Xiao-ping, Hao Guo-dong, et al. Survey on Wireless Sensor and Actor Network[C]//Proceedings of the 8th World Congress on Intelligent Control and Automation. June 2011 : 788-793.
  • 8Akyildiz I F, Kasimoglu I H. Wireless sensor and actor net- works:research chlalenges[J]. Ad Hoc Networks, 2004,2 (4) : 351-367.
  • 9Sabri N, Aljunid S A, Ahmad R B, et al. Towards Smart Wire less Sensor Actor Networks: Design Factors and Applications [C]//2011 IEEE Symposium on Industrial Electronicsand Ap- plications, ISIEA2011. 2011:704-708.
  • 10Zhang Shu-qin, Cui Yan, Dong Zhi-yong, et al. A Middleware Platform for WSAN based Application Systems [C] // Proeee- ding-Sth International Conference on Computer Sciences and Convergence Information Teehnology, ICCIT 2010. 2010: 981- 986.

共引文献16

同被引文献14

  • 1杨子胥.近世代数[M].北京:高等教育出版社,2004.
  • 2Akkaya K,Younis M. A survey of routing protocols in wireless sensor networks [J]. Elsevier Ad Hoc Network, 2005,3 (3) : 325-49.
  • 3Younis M, Munshi P, Gupta G, et al. Dependability andsecurity in sensor networks and systems [C]//Proceedings of the second IEEE Workshop on Dependability and Security in Sensor Networks and Systems. Washington: IEEE Press, 2006 . 82-91.
  • 4Heizelman W R,Chandrakasan A,Balakrishnan H. Energy efficient communication protocol for wireless micro sensor networks [C]//Proceedings of the IEEE Hawaii International Conference on System Sciences. Maui.. IEEE Computer Society,2000: 3005-3014.
  • 5Torfs T,Sterken T,Brebels S, et al. Low power wireless sensor network for building monitoring [J]. Sensors Journal, 2013,13(3) : 909-915.
  • 6All C,Samuel P. A distributed energy efficient clustering protocol for wireless sensor networks [J]. Computers and Electrical Engineering, 2010,36 (2) .. 303- 312.
  • 7Abuhelaleh M A, Elleithy K M. Security in wireless sensor networks: key management module in SOOAWSN [J]. International Journal of Network Security and Its Application,2010,2(4):67-78.
  • 8Yi C, Agrawai D. An improved key distribution mechanism for large scale hierarchical wireless sensor networks [J]. Security Issues in Sensor and Ad Hoc Networks, 2007,5 (1) : 35-48.
  • 9斯托林斯.密码编码学与网络安全:原理与实践[M]北京:电子工业出版社,2009:219-225.
  • 10王衡军,王亚弟,韩继红.移动Ad hoc网络安全分簇综述[J].计算机科学,2009,36(10):38-41. 被引量:5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部