期刊文献+

一种基于HECRT的物联网密钥管理方案 被引量:5

A Key Management Scheme for Internet of Things Based on HECRT
下载PDF
导出
摘要 针对物联网环境下的密钥管理、隐私保护等安全问题,提出一种基于同态加密与中国剩余定理(HECRT)的密钥管理方案,给出基于节点位置信息的分层网络模型,根据节点位置信息进行网络设施部署。通过构造双重密钥池实现网络密钥管理和分配,从而节省网络开销和节点资源消耗。在通信过程中采用同态加密技术处理节点隐私信息,以保障用户隐私数据的安全。仿真结果表明,该方案具有较好的网络连通性和较高的安全性。 Aiming at some security problems are considered in Internet of Things(IOT),such as key management,and privacy protection.A key management scheme based on Homomorphic Encryption and China Remainder Theorem (HECRT) is proposed,in which a layer network model based on node location is given to deploy network infrastructure.Double key pool is introduced for key management and distribution,which saves network overhead and node resource consumption.According to the use of homomorphic encryption for the note privacy information,it protects users' privacy and keeps the data processing safe.Simulation result shows that this scheme has good connectivity and security.
出处 《计算机工程》 CAS CSCD 2014年第8期27-32,37,共7页 Computer Engineering
基金 中央办公厅信息安全重点实验室基金资助项目(YZDJ1004 YZDJ0805) 中央高校基本科研业务费专项基金资助项目"LTE网络保密与认证关键技术研究"(YZDJ1101)
关键词 物联网 密钥管理 同态加密 中国剩余定理 共享密钥 密钥预分配 Internet of Things (IOT) key management Homomorphic Encryption (HE) China Remainder Theorem (CRT) shared key key pre-distribution
  • 相关文献

参考文献6

二级参考文献54

  • 1陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:56
  • 2CHENG Hong-bing,YANG Geng,WANG Jiang-tao,HUANG Xiao.An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):31-38. 被引量:8
  • 3范维澄,袁宏永.我国应急平台建设现状分析及对策[J].信息化建设,2006(9):14-17. 被引量:65
  • 4杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 5Tatebayashi M, Matsuzaki N, and Newman D B Jr. Key distribution protocol for digital mobile communication systems[C]. Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, United States, USA, August 20-24, 1989, Lecture Notes in Computer Science, Vol. 435: 324-334.
  • 6Eschenaner L and Gligor V D. A key-management scheme for distributed sensor networks[C]. Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 17-21, 2002: 41-47.
  • 7Chan H, Perrig A, and Song D. Random key predistribution schemes for sensor networks[C]. Proceedings of the IEEE Syrup. on Research in Security and Privacy, Berkeley, CA, USA, May 11-14 2003: 197-213.
  • 8Du W, Deng J, Han Y S, and Varshney P K. A pairwise key pre-distribution scheme for wireless sensor networks[C]. Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 27-30, 2003: 42-51.
  • 9Liu D G, Ning P, and Li R F. Establishing pairwise keys in distributed sensor networks[J]. A CM Trans. on Information and System Security, 2005, 8(2): 41-77.
  • 10Hussain S, Kausar F, and Masood A. An efficient key distribution scheme for heterogeneous sensor networks[C]. Proceedings of the 2007 international conference on Wireless communications and mobile computing, Honolulu, Hawaii, USA, August 12-16, 2007: 388-392.

共引文献46

同被引文献43

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部