期刊文献+

无线传感器网络的分组双空间密钥预分配方案

Group-based Double-space Key Pre-distribution Scheme for Wireless Sensor Networks
下载PDF
导出
摘要 针对Blom密钥预分配方案存在安全阈值的问题,提出一种面向无线传感网络的基于分组的双空间密钥预分配方案.将整个网络划分为多个逻辑组,组内节点服从以部署位置为中心的二维高斯分布,建立分组部署模型,组内节点和组间节点在不同的密钥空间上建立共享密钥.从全局连通性、抗毁性和有效性三个方面对方案进行理论和实验分析,结果表明本文方案在解决Blom方案安全阈值问题的同时,既提高了网络的抗毁能力,又保证任意两个节点能够直接建立共享密钥. To solve the problem of security threshold in key pre-distribution scheme proposed by Blom, a new group-based double- space key pre-distribution scheme is proposed for wireless sensor networks. The scheme establishes the group-based deployment model and the key spaces of intra-group nodes and inter-group ones are different respectively. The performance analysis is given in the aspect of network connectivity, resiliency and efficiency. Results show that the scheme not only solves the problem of security threshold in Blom key pre-distribntion scheme, but also improves the network resilience and guarantees direct establishment of the shared key be- tween any two nodes.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第9期2125-2128,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61170035)资助 江苏省自然科学基金重大专项(BK2011022)资助
关键词 无线传感器网络 密钥预分配 密钥空间 抗毁性 wireless sensor networks key pre-distribution key space resiliency
  • 相关文献

参考文献2

二级参考文献12

  • 1YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3Akyildiz Ian F,Su Weilian,Sankarasubramaniam Yogesh,et al.A survey on sensor networks[J].IEEE Communications Magazine,2002, 40(8) : 102-114.
  • 4Eschenauer L,Gligor V.A key management scheme for distributed sensor networks[C]//Proc of the 9th ACM Conf on Computer and Communications Security, Washington, DC, 2002: 41-47.
  • 5Zhu S,Setia S.LEAP:efficient security mechanisms for large-scale distributed sensor networks[C]//Proc of the lOth ACM Conf on Computer and Communications Security, Washington, DC, 2003 : 62-72.
  • 6Perrigy A,Szewczyk R.SPINS:security protocols for sensor networks[J]. Wireless Networks,2002,8 (5) : 521-534.
  • 7Du Wengliang,Deng Jing.A pairwise key predistribution scheme for wireless sensor networks[C]//Proc of the 10th ACM Conf on Computer and Communications Security(CCS), Washington, DC, 2003 : 42-51.
  • 8Wander A S,Gura N,Eberle H,et al.Energy analysis of public-key cryptography for wireless sensor networks[M].New York:Pervasive Computing and Communications,2005:324-328.
  • 9Zhang Yanchao,Liu Wei,Lou Wenjing,et al.Location-based compromise-tolerant security mechanisms for wireless sensor networks[J]. IEEE Journal on Selected Areas in Commnuications,2006,24(2): 247-260.
  • 10Blom R.An optimal class of symmetric key generation systems[C]// Thomas Beth,Norbert Cot,Ingemar Ingemarsson.Lecture Notes in Computer Science:Advances in Cryptology,Proceedings of EUROCRYPT 84.Berlin, Heidelberg: Springer-Verlag, 1985 : 335-338.

共引文献113

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部