期刊文献+

数据储存式无线传感器网络下一个具有高效能的密钥管理方案

Efficient Key Management Scheme for Data-centric Storage Wireless Sensor Networks
下载PDF
导出
摘要 针对无线传感器网络能量、存储空间、通信开销等局限性问题,基于pDCS(Security and Privacy Support for Data-Centric Sensor Networks),在保证不失其安全性的前提下,以互斥基底系统(Exclusion Basis System,EBS)建构一个具有更高效率的分布式密钥管理方案,将其命名为ERP-DCS。该方案将网络密钥的管理工作(包括密钥分配、重置及撤销)分散至各个簇集中,藉以降低密钥重置阶段所需的通信量,节省能源,进而延长网络寿命。论证分析表明,与pDCS相比,ERP-DCS仅增加了些微的储存成本,却能大幅地降低密钥重置时的更新通信量。 Based on the Exclusion Basis Systems(EBS),we proposed an efficient distributed key management scheme,termed as ERP-DCS,to improve the deficiencies identified in the pDCS scheme.ERP-DCS attempts to distribute the key management tasks,including key distribution,rekeying,and key revocation,to each cluster(i.e.grid cell)to reduce the number of rekeying messages.The results show that,comparing to the pDCS scheme,the ERP-DCS is superior,in terms of update messages needed in the rekeying process,at a little cost in key storage.
出处 《计算机科学》 CSCD 北大核心 2014年第B11期277-281,共5页 Computer Science
基金 河南省科技厅:无线传感器网络密钥管理方案研究(12B520043)资助
关键词 密钥管理 数据储存式无线传感器网络 信息安全 互斥基底系统 分散式系统架构 Key management Data-centric storage sensor network Information security Exclusion basis system Distributed system architecture
  • 相关文献

参考文献12

  • 1黄梅根,常新峰.一种基于蒙特卡罗法的无线传感器网络移动节点定位算法研究[J].传感技术学报,2010,23(4):562-566. 被引量:16
  • 2Ratnasamy S, Karp B, Yin L, et al. GHT: a Geographic Hash Table for Data-Centric Storage[C]//Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications. 2002 : 78-87.
  • 3Ghose A, Grossklags J, Chuang J. Resilient Data-Centrie Storage in Wireless Ad Hoc Sensor Networks Mobile Data Management [C]//Lecture Notes in Computer Science. 2003:45-62.
  • 4Newsome J, Shi E, Song D, et al. The Sybil Attack in Sensor Networks:Analysis Defenses[C]//Proceedings of the 3rd In- ternational Symposium on Information Processing in Sensor Networks. 2004 : 259-268.
  • 5Parno B,Perrig A, Gligor V. Distributed Detection of Node Rep- lication Attacks in Sensor Networks[J]. IEEE Symposium on Security and Privacy. 2005:49-63.
  • 6Peng T, Leckie C, Ramamohanarao K. Survey of Network-Based Defense Mechanisms Countering the DoS and DIDOS Problems [J]. ACM Comput. Surv. , 2007,39(1).
  • 7Diffie W, Hellman M. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976,22 (6) : 644-654.
  • 8Min S,Sencun Z,Wensheng Z,et al. pDCS:Security and Privacy Support for Data-Centric Sensor Networks[J]. IEEE Transac- tions on Mobile Computing, 2009,8 (8) : 1023-1038.
  • 9Eltoweissy M, Heydari M H, Morales L, et al. Combinatorial Optimization of Group Key Management[J]. Journal of Network and Systems Management, 2004,12 (1) : 33-50.
  • 10Younis M F, Ghumman K, Eltoweissy M. Location-Aware Com- binatorial Key Management Schemefor Clustered Sensor Net- works[J]. IEEE Transactions on Parallel and Distributed Sys tems, 2006,17 (8) : 865-882.

二级参考文献15

  • 1Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing, USB-EECS-2009-28 [R]. Berkeley: University of California, 2009.
  • 2Hacigumus H, Mehrotra S, Balakrishna I. Providing database as a service [C]//Proc of the 18th Int Conf on Data Engineering. Piscataway, NJ: IEEE, 2002: 29-40.
  • 3Hacrg urnus H, Balakrishna I, Chen Li, et al. Executing SQL over encrypted data in the database-service-provider model [C]//Proc of the Int Conf on Management of Data. New York, ACM, 2002, 216-227.
  • 4Atallah M, Frikken K, Blanton M. Dynamic and efficient key management for access hierarchies [C]//Proc of the 12th Conf on Computer and Communications Security. New York: ACM, 2005: 190-202.
  • 5Akl S, Taylor P. Cryptographic solution to a problem of access control in a hierarchy [J]. ACM Trans on Computer System, 1983, 1 (3), 239-248.
  • 6De Capitani di Vimercati S, Foresri S, j ajodia S, er al. Over?encryption: Management of access control evolution on out sourced data [C]//Proc of the 33rd Int Conf on Very Large Data Bases. New York, ACM, 2007: 123-134.
  • 7Miklau G, Suciu D. Controlling access to published data using cryptography [C]//Proc of the 29th Inr Conf on Very Large Data Bases. San Francisco: Morgan Kaufmann, 2003: 898-909.
  • 8Hacrgumus H, Mehrotra S. Efficient key updates in encrypted database systems [C]//Proc of the 2nd VLDB Workshop on Secure Data Management. New York: ACM, 2005, 1-15.
  • 9Sion R. Secure data outsourcing [C]//Proc of the 33rd Int Conf on Very Large Data Bases. New York, ACM, 2007: 1431-1432.
  • 10Agrawal R, Kiernan J, Blundo C, et al. Efficient key management for enforcing access control in outsourced scenarios [C]//Proc of the 24th fnr Information Security Coni. Berlin: Springer, 2009: 364-375.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部