期刊文献+

物联网环境下感知网络密钥管理技术研究 被引量:2

Research on the Key Management Technology of Sensor Networks under Internet of Things Environment
下载PDF
导出
摘要 物联网环境下感知网络密钥管理技术研究是感知网络安全方面的一项基础性研究,具有重要意义。对目前国内外学者关于这方面的研究成果进行综述,以给未来有关这方面的研究工作带来启发。首先,阐述了物联网环境下感知网络密钥管理技术的研究内容以及所面临的挑战;其次,对目前国内外关于物联网环境下感知网络密钥管理技术的研究成果进行了分类总结,并探讨了已有成果所存在的问题与不足;最后指出了物联网环境下感知网络密钥管理技术下一步的研究重点。 The research on key management technology of sensor network under internet of things environment is a basic work, which has vital significance for research on sensor network security. This paper reviews on the research results by the current domestic and foreign scholars, in order to bring the inspiration for the future related research work. First, it elaborates the research content and challenges of the key management technology of sensor network under internet of things environment; secondly, summarizes the research achievements of the technology at home and abroad, and discusses the existing problems and shortcomings of existing achievements; finally, points out the research focus in the next step.
出处 《电脑与电信》 2015年第7期21-25,共5页 Computer & Telecommunication
基金 湖南省科技计划项目 项目编号:2014FJ6026 2014年衡阳市科技计划项目 项目编号:2014KG61 湖南省哲学社会科学基金 项目编号:14YBA129 湖南省教育科学"十二五"规划课题 项目编号:XJK014CXX004 湖南工学院教改项目 项目编号:JY201425
关键词 物联网 感知 密钥管理 轻量级 Internet of Things sensor key management lightweight
  • 相关文献

参考文献18

  • 1O SAVRY, F VACHRAND. The lnternet of Things:20th Tyrrhe- nian Workshop on Digital Communications [M].New York: Springer, 2010. 409-418.
  • 2李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,45(1):1-15. 被引量:441
  • 3M FINMINO GB BRANDAO. AMG GUERREIRO, RA DEM VALENTIM.Neural Cryptography Applied to Key Management Protocol with Mutual Authentication in RFID Conference for lntemet Technology 2009). 2009:1-6. Systems[C]// Proc. of International and Secured Transactions(ICITST.
  • 4M RIEBACK, B CRISPO, and A TANENBAUM. The Evolution of RFID Security[J]. IEEE Pervasive Computing, 5(1):62 - 69, 2006.
  • 5A PERRIG, R. SZEWCZYK, JD TYGAR, V WEN, DE CULL- ERo SPINS:Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5):521-534.
  • 6L ESCHENAUERL, VD GLIGOR. A key-management scheme for distributed sensor networks[C]// Proc. of the 9th ACM Conference on Computer and Communications Security(CCS'02). 2002: 41- 47.
  • 7H CHAN, A PERRIG, D SONG. Random key predistribution schemes for sensor networks[C]//Proc, of the 2003 IEEE Sym.On Security and Privacy. 2003. 197-213.
  • 8W DU, J DENG , YS HAN, et al. A Pair wise Key Pre-Distribn- tion Scheme for Wireless Sensor Networks[C]//Proc. of the 10th ACM Conf on Computer and Communications Security.2003.42-51.
  • 9. W DU, J DENG , YS HAN, et al. A key management scheme for wireless sensor networks using deployment knowledge[C]//Proc, of IEEE INFOCOM'04. 2004. 586-597.
  • 10D LIU, P NING. Location-based pairwise key establishments for static sensor networks[C]//Proc.of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. 2003. 72-82.

二级参考文献171

共引文献466

同被引文献3

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部