期刊文献+

基于PTPP的WSN密钥分配方法研究 被引量:2

Research of WSN key distribution method based on PTPP
下载PDF
导出
摘要 伴随WSN的广泛应用,其安全问题也日益得到重视。WSN节点通信时需要验证对方的身份,常用的方式是密钥验证方式,如何确保密钥分配过程的安全性是整个WSN网络通信安全的基础。在分析目前常用的密钥分配算法的基础上,提出了基于多项式、时间和身份相关的密钥对分配方法,利用四元对称多项式将节点的部署时间和节点ID进行绑定,并在此基础上建立节点间的共享密钥对协商机制。对方法的安全性和可行性进行了分析,并通过仿真实验进行验证,结果表明基于PTPP的WSN密钥对分配方法可以有效阻止复制节点伪装新节点加入网络行为,提高了密钥分配的安全性。 With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algo- rithm, this paper proposed a new method based on the polynomial, time and identity-related key distribution, which used qua- ternion symmetric polynomial so as to bind deployment time and node ID. And it established a shared key between nodes on the basis of consultation mechanism. It analyzed and verified the safety and feasibility of the method, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to networks,improve the security of key distribution process.
机构地区 陆军军官学院
出处 《计算机应用研究》 CSCD 北大核心 2017年第2期495-498,517,共5页 Application Research of Computers
基金 国家自然科学基金面上项目(61272333,61273302) 安徽省青年基金资助项目(1208085MF94)
关键词 无线传感器网络 密钥分配 PTPP 复制节点 KERM KEREM wireless sensor network(WSN) key distribution PTPP replication node key establishment request message (KERM) key establishment response message(KEREM)
  • 相关文献

参考文献3

二级参考文献46

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:673
  • 2宋志高,陈菲,陈克非,李晖.无线传感器网络路由协议的安全性分析与研究[J].计算机仿真,2005,22(5):134-136. 被引量:6
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4Tatebayashi M, Matsuzaki N, and Newman D B Jr. Key distribution protocol for digital mobile communication systems[C]. Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, United States, USA, August 20-24, 1989, Lecture Notes in Computer Science, Vol. 435: 324-334.
  • 5Eschenaner L and Gligor V D. A key-management scheme for distributed sensor networks[C]. Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 17-21, 2002: 41-47.
  • 6Chan H, Perrig A, and Song D. Random key predistribution schemes for sensor networks[C]. Proceedings of the IEEE Syrup. on Research in Security and Privacy, Berkeley, CA, USA, May 11-14 2003: 197-213.
  • 7Du W, Deng J, Han Y S, and Varshney P K. A pairwise key pre-distribution scheme for wireless sensor networks[C]. Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 27-30, 2003: 42-51.
  • 8Liu D G, Ning P, and Li R F. Establishing pairwise keys in distributed sensor networks[J]. A CM Trans. on Information and System Security, 2005, 8(2): 41-77.
  • 9Hussain S, Kausar F, and Masood A. An efficient key distribution scheme for heterogeneous sensor networks[C]. Proceedings of the 2007 international conference on Wireless communications and mobile computing, Honolulu, Hawaii, USA, August 12-16, 2007: 388-392.
  • 10Younis M F, Ghumman K, and Eltoweissy M. Location-aware combinatorial key management scheme for clustered sensor networks[J]. IEEE Trans. on Parallel and Distrib, 2006, 17(8): 865-882.

共引文献16

同被引文献17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部