期刊文献+

电力物联网中基于多跳网络的密钥管理方案 被引量:3

Key Management Scheme Based on Multi-hop Network in Electric Power Internet of Things
下载PDF
导出
摘要 输电线路状态检测是电力物联网建设中的重要应用,针对输电线路在线监测中部署的大尺度、多跳无线传感器网络,设计了一种新的层次化密钥管理方案,对簇进行重新组织,依据新的跳数来生成新的密钥替换过时密钥。通过WSNs分簇中不同的跳数作为密钥管理机制的种子,实现轻量级的动态密钥安全管理。仿真结果表明,该方案不仅具有密钥系统局域化、低能量损耗、不需要特殊节点等特点,而且也提高了网络安全水平。 Absrtact: Transmission line condition detection is an important application in the construction of the power internet of things. In this paper, a new hierarchical key management scheme is designed for the large-scale,multi-hop wireless sensor networks(WSNs) deployed in transmission line on-line monitoring to reorganize clusters and generate new key substitutions based on new hops. By using different hops in WSNs clustering as seeds of key management mechanism, lightweight dynamic key security management is realized. The simulation results show that the scheme not only has the characteristics of localization of key system, low energy consumption and reliance on no special nodes but improves the security safety level.
作者 杨凡凡 肖诗意 YANG Fanfan;XIAO Shiyi(State Grid Anqing Electric Power Supply Company,Anqing Anhui 246003,China;School of Electrical and Electronic Engineering,Hubei University of Technology,Wuhan 430068,China)
出处 《浙江电力》 2020年第4期75-82,共8页 Zhejiang Electric Power
关键词 电力物联网 层次化 多跳网络 密钥管理 power IoT hierarchical multi-hop network key management
  • 相关文献

参考文献15

二级参考文献173

  • 1陈贵海,李成法,叶懋,吴杰.EECS:一种无线传感器网络中节能的聚类方案[J].计算机科学与探索,2007,1(2):170-179. 被引量:24
  • 2李健,杨爱平,顾畹仪,张杰.新的ASON路由实现方案[J].通信学报,2006,27(6):72-80. 被引量:6
  • 3谭志,纪越峰.多域分层ASON路由技术[J].北京邮电大学学报,2007,30(1):114-117. 被引量:10
  • 4Akyildiz IF, Su W, Sankarasubramaniam Y. A survey on sensor networks[J]. IEEE Communications Magazine, 2002, 40(8):102-114.
  • 5谢季坚,刘承平.模糊数学方法及应用[M].3版.武汉:华中科技大学出版社,2006.
  • 6张志东,孙雨耕,刘洋,杨挺.无线传感器网络能量模型[J].天津大学学报,2007,40(9):1029-1034. 被引量:30
  • 7BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and a- tomic proxy cryptography[ C]// Proceedings of Eurocrypt 98, LNCS 1403. Berlin: Springer-Verlag, 1998: 127- 144.
  • 8CANETYI R, HOHENBERGER S. Chosen-ciphertext secure proxy re-encryption[ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007:185-194.
  • 9SHAMIR A. Identity-based cryplosystems and signature schemes [ C] // Proceedings of CRYPTO 84, LNCS 196. Berlin: Springer- Verlag, 1985:47 - 53.
  • 10GREEN M , ATENIESE G . Identity - based proxy re - encryption [ C]// Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2007: 288 - 306.

共引文献479

同被引文献14

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部