期刊文献+

基于多项式无线传感器网络密钥预分配方案 被引量:4

A Key Pre-distribution Scheme Based on Polynomial for Wireless Sensor Networks
下载PDF
导出
摘要 针对无线传感器网络密钥管理中连通性、效能及安全性不足问题,基于阶层式无线传感器网络与二元对称多项式提出ESKDM(Efficient and Scalability Key Distribution Mechanism)方案。该方案通过运用多项式的特性,使传感器节点之间只需透过ID的信息交换即可建立密钥。相较于同类方案,ESKDM方案大幅度的降低传感器节点的通信成本,并完全抵抗节点捕获攻击。无论网络节点的大小,一般节点所需要储存的秘密信息都为固定的信息,能够支持大型的WSN。也提出在新增节点的同时,不需要在线的基站存在,更能适用于实际应用。 Key pre-distribution scheme is related to the corporative security between the nodes in wireless sensor net- work. Most of the existing key pre-distribution schemes have the shortcomings such as low connectivity-poor resistance and scalability. This paper further proposes a hierarchical sensor network key pre-distribution scheme ESKDM(Efficient and Scalability Key Distribution Mechanism) by symmetric bivariate polynomial function. Theoretical analysis and simulation re- sults show that the ESKDM scheme has good performances in the security connectivity rates, resistance, flexibility and other aspects.
出处 《计算机与数字工程》 2014年第11期2117-2122,2201,共7页 Computer & Digital Engineering
基金 河南省教育厅:无线传感器网络密钥管理方案研究(编号:12B520043)资助
关键词 无线传感器网路 密钥管理 密钥预分配 二元对称多项式 wireless sensor network(WSN), key management, key pre-distribution, symmetric bivariate polynomialfunction
  • 相关文献

参考文献13

  • 1陈渊,叶清.无线传感器网络安全认证方案综述[J].计算机与数字工程,2014,42(2):261-266. 被引量:15
  • 2L. Eschenauer, V. Gligor. A Key-Management Scheme for Distributed Sensor Networks[C]//Proceed- ings of 9th ACM Confrence Computer and Communica- tions Security, 2002:41-47.
  • 3K. V. Leaerhovenl, et al. Medical Healthcare Monito- ring with Wearable and Implantable Sensors[C]//Pro- ceedings of the International Workshop on Ubiquitous Computing for Pervasive Heahhcare Application,2004.
  • 4R. D. Pietro, L. V. Mancini, A. Mei. Efficient and Resilient Key Discovery Based on Pseudo Random Key Pre-Deployment[C]//Proceedings of the 18th Interna- tional Parallel and Distributed Processing Symposium, 2004 : 26-30.
  • 5W. L. Du, J. Deng, Y. Han, et al. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network [C]//Proceedings of 10th ACM Conference on Com- puter and Communications Security, 2003 : 42-51.
  • 6Y. Cheng, D. P. Agrawal. Efficient Pairwise Key Es tablishment and Management in Static Wireless Sensor Networks[C]//Proceedings of Mobile Adhoc and Sen- sor Systems Conference,2005.
  • 7Y. Cheng, D. P. Agrawal. An Improved Key Distri- bution Mechanism :for Large-Scale Hierarchical Wire less Sensor Networks. Ad Hoc Networks, 2007 : 35-48.
  • 8C. Blundo, A. D. Santis, A. Herzberg, et al. Per- fectly-securekey distribution for dynamic conferences. Leeture Notes in Computer Science, 1993:471-486.
  • 9K. V. Leaerhovenl, et al. Medical Healthcare Monito- ring with Wearable and Implantable Sensors[C]//Pro- ceedings of the International Workshop on Ubiquitous Computing for Pervasive Healtheare Application, 2004.
  • 10I. B. Damgard. A Design Principle for Hash Func- tions[C]//Advances in Cryptology-CRYPTO'89 Pro- ceedings, Springer-VerIag, 1990: 416-427.

二级参考文献30

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010.
  • 3Eschenauer L,Gligor V.A key-management scheme for distributed sensor networks[C] //Proceedings of the 9th ACM Conference on Computer and Communications Security,Washington DC,2002:41-47.
  • 4Chan H,Perrig A,Song D.Random key pre-distribution schemes for sensor networks[C] //Proceedings of the 2003 IEEE Symp on Security and Privacy,Washington,2003:197-213.
  • 5Blom R.An optimal class of symmetric key generation systems[C] //Proceedings of the International conference on the Theory and Applications of Cryptographic Techniques,Paris,1984:335-338.
  • 6Du W,Deng J,Han Y S,et al.A Pairwise key Predistribution scheme for wireless sensor networks[J].ACM Transacnon on Information and System Security,2005,8 (2):228-258.
  • 7Blundo C,Santis A D,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences[J].Information and Computation,1998,146 (1):1-23.
  • 8Liu D,Ning P.Establishing pairwise keys in distribu ted sensor networks[C] //Proceedings of the 10th ACM Conference on Computer and Communications Security,Washington,DC,2003:52-61.
  • 9Qiu Y,Zhou J Y,Baek J,et al.Authentication and Key Establishment in Dynamic Wireless Sensor Networks[J].Sensors,2010:3718-3731.
  • 10Siddique Q.Kerberos Authentication Wireless Sensor Networks[J].Computer Science Series,2010:67-80.

共引文献14

同被引文献19

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部