期刊文献+

一种基于可信计算平台的无线传感器网络标识密钥更新方法 被引量:2

A WSN identity-based keys updating method based on trusted computing platform
下载PDF
导出
摘要 针对无线传感器网络使用标识密码的密钥更新问题,设计了一种以可信计算平台为密钥生成中心,利用单向函数构造随机数池的高效密钥更新方案,使得传感器节点既能对密钥更新消息进行验证,又不至于引起过多的网络通信。为保证通信密钥的安全性,使用可信计算平台作为密钥生成中心,保证了密钥源头的安全。密钥更新时,利用可信计算平台的特性对其平台配置情况进行验证,来判断其所发出的消息和密钥的真实性与完整性。利用单向函数产生随机数池,一方面使得传感器节点可以验证消息的真实性,另一方面可以抵抗重放攻击。 We proposed an efficient identity-based keys updating scheme in wireless sensor networks (WSN), in which the trusted computing platform serves as the key generation center, and the one-way function is used to construct a random pool. The scheme enables sensor nodes to verify key updating messages without causing excessive network traffic. To ensure the security of the keys, the scheme uses the trusted computing platform as the key generation center to ensure the security of the key source. When keys are updated, the features of the trusted computing platform can be used to validate the platform configurations and determine the authenticity and integrity of the messages and the keys in question. One-way function is used for generating a random pool, so that sensor nodes can verify the authen- ticity of the messages and resist replay attacks.
出处 《计算机工程与科学》 CSCD 北大核心 2015年第10期1856-1861,共6页 Computer Engineering & Science
基金 湖北省教育厅研究课题资助项目(B2013102)
关键词 无线传感器网络 标识密码 可信计算平台 wireless sensor network (WSN) identity-based cryptographic (IBC) trusted computing platform
  • 相关文献

参考文献4

二级参考文献59

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 3Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 4Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11.
  • 5Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47.
  • 6Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71.
  • 7Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213.
  • 8Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13.
  • 9Liu D,Ning P.Multi-level μTESLA:broadcast authentication for distributed sensor networks[J].ACM Transactions in Embedded Computing Systems (TECS),2004,3(4):800-836.
  • 10Shamir A.Identity-based cryptography and signature schemes[A].Advances in Cryptology,CRYPTO'84,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1985,196:47-53.

共引文献65

同被引文献27

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部