期刊文献+

基于信誉模型的WSN密钥管理方案 被引量:1

Key Management Scheme in Wireless Sensor Network Based on Reputation Model
下载PDF
导出
摘要 针对无线传感器网络(WSN)的安全问题,结合椭圆曲线密码体制,提出一种基于信誉模型的WSN密钥管理方案。依据Beta分布建立节点信誉模型,采用分布式技术使方案支持节点的移动和密钥的动态管理,以避免分组密钥管理中的单点失效现象。分析结果表明,与E-G和IBC方案相比,该方案不仅能抵御外部节点的攻击,而且能防止内部节点的恶意行为。在保证网络安全的同时,还能提高网络抗毁性和节点连接概率,降低存储与通信开销。 Focusing on the study of the security in Wireless Sensor Network(WSN), combined Elliptic Curve Cryptosystem(ECC), this paper presents a key management scheme based on reputation model. It provides reputation model based on Beta distribution. A single point of collapse problem in group key-management is avoided due to distributed key establishment, to update among the nodes and support node mobility and dynamic key management. Analysis results show that, compared with E-G and 1BC scheme, this scheme not only can resist the attack, s from outside nodes, but also can prevent attacks or malicious behaviors from internal nodes. The performances of WSN security, invulnerability, connection probability of nodes, less storage and communication overhead, can be substantially improved by using the scheme.
出处 《计算机工程》 CAS CSCD 2013年第11期123-126,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61300170 61170233 61232018 61272472) 博士后基金资助项目(2011M501060) 安徽高校省级自然科学基金资助项目(KJ2013A040 KJ2012B012)
关键词 无线传感器网络 密钥管理 信誉模型 信任值 BETA分布 椭圆曲线密码体制 Wireless Sensor Network(WSN) key management reputation model trust value Beta distribution Elliptic CurveCryptosystem(ECC)
  • 相关文献

参考文献10

二级参考文献68

  • 1黄海平,王汝传,孙力娟,陈志.基于密钥联系表的无线传感器网络密钥管理方案[J].通信学报,2006,27(10):13-18. 被引量:7
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002, 38(4) : 393-422
  • 4Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing in wireless sensor networks//Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS). Providence, Rhode Island, USA, 2003: 32-39
  • 5Lazos L, Poovendran R. SeRLoc: Secure range-independent localization for wireless sensor networks//Proceedings of the ACM Workshop on Wireless Security (WISE). Philadelphia, PA, USA, 2004:21-30
  • 6Przydatek B, Song D, Perrig A. SIA.. Secure information aggregation in sensor networks//Proceedings of the 1st Inter- national Conference on Embedded Networked Sensor Systems. California, USA, 2003:255-265
  • 7Crossbow Technology, Inc. MICA2: Wireless measurement system.
  • 8Koc K C. High-speed RSA implementation. RSA Laboratories: Technical Report TR201, 1994
  • 9Neuman B C, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications, 1994, 32 (9) : 33-38
  • 10Chan H, Perrig A, PIKE: Peer intermediaries for key establishment in sensor networks//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Miami, FL, USA, 2005:524-535

共引文献68

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部