期刊文献+

基于IBC的无线传感器网络层簇式密钥管理方案

Key-management Scheme Based on IBC for Clustering Wireless Sensor Network
下载PDF
导出
摘要 密钥管理是无线传感器网络中关键安全技术之一。无线传感器网络的密钥管理由于布置位置、计算量有限、存储能力有限,使得设计面临许多挑战。在分析无线传感器网络安全需求的基础上,针对无线传感器网络密钥管理问题,运用层簇式网络结构,通过身份加密方式,进行节点合法性认证,完成基站与簇头,簇头与节点之间的密钥,保证无线传感器网络安全通信。通过安全性分析和效能分析,该密钥管理方案较好的满足无线传感器网络的安全需求,降低通信开销,有效地解决密钥管理的问题。 Key management is one of the key security technology in wireless sensor networks. The key management of wireless sensor network because the arrangement widely, calculation, storage capacity is limited, which makes the design fa- cing a lot of challenges. Based on the analysis of the security requirements of wireless sensor networks, aiming at the key management problem in wireless sensor networks, application layer cluster network structure, the identity based encryption method, node legitimacy authentication, the paper complete key management of the base station and cluster head and between the cluster head and the node key, to ensure the safety of communication in wireless sensor network. Through the analysis of security and performance, the key management scheme satisfies the security requirements of wireless sensor network, reduce the communication cost, solve the effective key management problems.
作者 李政 魏国珩
出处 《计算机与数字工程》 2014年第11期2132-2136,2221,共6页 Computer & Digital Engineering
关键词 IBC体制 无线传感器网络 密钥管理 层簇式 密钥建立 认证 IBC, wireless sensor network, key management, layer clustered, key establishment, authenticate
  • 相关文献

参考文献17

  • 1Reza Azarderskhsh, Arash Reyhani-Masolleh. Secure Clustering and Symmertic KeyEstablishment in Heter- ogeneous Wireless Sensor Networks [C]//EURASIP Journal on Wireless Communication and Networking, Hindawi Publishing Corporation, 2011.
  • 2李琳,王汝传,姜波,黄海平.无线传感器网络层簇式密钥管理方案的研究[J].电子与信息学报,2006,28(12):2394-2397. 被引量:11
  • 3周琴,李腊元,程真.一种基于分簇的无线传感器网络动态密钥分发协议[J].传感技术学报,2009,22(7):1002-1006. 被引量:4
  • 4Eschenauer L, Gligor V D. A key-management scheme for sensor networks[C]//The 9th ACM Conference on Computer and Communication Security(CCS). Wash ington DC, USA, Nov. 2002: 41-47.
  • 5Chen H, Perrig A, Song D. Random key pre-distribu tion schemes for sensor networks[C]//IEEE Symposi- um on Security and Privacy. Berkeley, California, May 2003 : 285-289.
  • 6郭宇飞,王换招,曹宁,赵青苹.簇状传感器网络临时分类密钥管理协议[J].北京邮电大学学报,2008,31(3):63-66. 被引量:3
  • 7SK. MD. M. Rahman, N. Nasser, K. Saleh. Identity and pairing-based secure key management scheme for heterogeneous sensor networks[J]. the 4th IEEE In- ternational Conference on Wireless and Mobile Compu- ting, 2008,10 : 423-428.
  • 8K. Ren, S. Yu, W. Lou, et al. Multi-user broadcast authentication in wireless sensor networks[J]. IEEE Transactions on Vehicular Technology, 2009, 58 (8) : 4554-4564.
  • 9M. Reza, M. Raf, A. Keshavarz-Haddad. Watchdog LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks[J]. ACSIJ Advances in Computer Science,2013(2) : 105-117.
  • 10贾晨军,廖永建,陈抗生.无线传感器网络中高效的基于身份的加密算法[J].浙江大学学报(工学版),2009,43(8):1396-1400. 被引量:7

二级参考文献56

  • 1陈丹,郑增威,李际军.无线传感器网络研究综述[J].计算机测量与控制,2004,12(8):701-704. 被引量:100
  • 2李晖,彭志威,陈克非.无线传感器网络及其安全问题[J].中兴通讯技术,2004,10(B10):30-34. 被引量:13
  • 3程宏兵,王江涛,杨庚.SPINS安全框架协议研究[J].计算机科学,2006,33(8):106-108. 被引量:10
  • 4邱慧敏,杨义先,钮心忻.无线传感器网络中广播通信的安全协议设计[J].北京邮电大学学报,2006,29(5):103-106. 被引量:7
  • 5YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 6LAI Bo-cheng, KIM S, VERBAUWHEDE I. Scalable session key construction protocol for wireless sensor networks[C]// Proceedings of IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES). Austin: IEEE, 2002.
  • 7BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [C]// Proceedings of CRYPTO' 92. Berlin: Springer-Verlag, 1992: 471- 486.
  • 8ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [C]//Proceedings of the 9th ACM Conference on Computer and Com- munications Security. New York: ACM, 2002: 41-47.
  • 9CHAN Hao-wen, PERRIG A, SONG Xiao-dong. Ran- dora key predistribution schemes for sensor networks [C]// IEEE Symposium on Security and Privacy. Washington: IEEE, 2003.
  • 10SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Proceedings of CRYPTO' 84. Berlin: Springer-Verlag, 1984:47-53.

共引文献129

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部