期刊文献+

无线传感器网络对偶密钥误用检测算法

Algorithm for Misused Pairwise Keys Detection in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络正常节点之间的对偶密钥有可能受损,攻击者将误用受损密钥伪造信息数据包,破坏正常通信或消耗节点有限的资源.针对这一问题,提出一种对偶密钥误用检测算法.在每一个信息数据包里附加一个可验证的认证因子,转发节点通过验证认证因子就能够确认对偶密钥是否被误用.通过安全分析和性能分析表明该检测算法的有效性.而且,该算法可集成到大多的密钥预分发算法或错误数据过滤算法,以提供更可靠的安全通信. In wireless sensor networks, the pairwise keys shared by non-compromised nodes could be compromised, then the adversary would misuse the pairwise keys to forge message report in order to destroy secure communication or deplete the limited resource in sensor nodes. To address this issue, in this paper, an algorithm is proposed to detect misused pairwise keys. Specially, an efficient verifiable authenticator is attached to each message report. The forwarding node can detect whether the pairwise key is misused by verifying the authenticator. The security analysis and performance analysis demonstrate the efficiency of the proposed algorithm. Moreover, the proposed algorithm can be integrated with most of key pre-distribution schemes or false data filtering schemes to provide more reliable secure communication.
出处 《计算机系统应用》 2014年第9期94-101,共8页 Computer Systems & Applications
基金 国家自然科学基金(61071065)
关键词 误用对偶密钥 认证因子 BLOOM FILTER 无线传感器网络 安全 misused pairwise key authenticator Bloom Filter wireless sensor networks security
  • 相关文献

参考文献18

  • 1Chaddoud G. A selective survey on key distribution in sensor networks. Damascus University Journal, 2012, 28(1): 105-123.
  • 2Liu D, Dong Q. Detecting misused keys in wireless sensor networks. International Performance Computing and Communications Conference. April 2007. 272-280.
  • 3Kim M, Han YJ, Park SH, Chung TM. An enhanced misused key detection mechanism in wireless sensor networks. Second International Conference on Sensor Technologies and Applieations(SENSORCOMM). 2008. 645-650.
  • 4Park MW, Kim JM, Han YJ, Chung TM. A misused key detection mechanism for hierarchical routings in wireless sensor network. 4th International Conference on Networked Computing and Advanced Information Management(NCM). 2008.47-52.
  • 5Kang DM, Park MW, Han YJ, Park SH. A misused key detection mechanism using the token in Wireless Sensor Networks. The 12th International Conference on Advanced Communication Technology (ICACT). 2010. 238-242.
  • 6Han YJ, Park MW, Kim JM, Chung TM. A light-weighted misused key detection in wireless sensor networks. Computational Science and Its Applications-ICCSA 2010, Lecture Notes in Computer Science Volume 6018, 2010: 352-367.
  • 7Goyal R, Prasad D. An efficient security scheme for wireless sensor networks. International Journal of Emerging Technology and Advanced Engineering, 2013, 3(4): 793-796.
  • 8Broder A, Mitzenmacher M. Network applications of bloom filters: A survey. Intemet Mathematics, 2004, 1(4): 485-509.
  • 9Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. 1st IEEE Int' Conf. on Sensor and Ad Hoc Communications and Networks. IEEE Press. 2004. 71-80.
  • 10Roman R, Alcaraz C, Lopez J. A survey of cryptographic primitives and implementations for sensor network nodes. Mobile, Networks and Applications (MONET) Journal, Springer, 2007, 12(4): 231-244.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部