期刊文献+

基于多项式的无线传感器网络的密钥管理 被引量:2

下载PDF
导出
摘要 基于q-composite方案,提出了一种无线传感器网络随机密钥预分布方案,引入了t次多项式,解决了q-composite方案中被俘节点门限值过低的问题。在保持与q-composite方案相同连通性的前提下,该方案可大幅度提高被俘节点门限值,能有效增强传感器网络的安全性,适用于安全性要求很高,节点分布密度较大的传感器网络。
作者 林玲 黄迪明
出处 《计算机时代》 2007年第4期25-26,38,共3页 Computer Era
  • 相关文献

参考文献3

  • 1Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proc 9th ACM Conf on Computer and Communication Security[C].Washington DC,2002:41~47.
  • 2Chan H W,Perrig A,Song D.Random Key predistribution schemes for sensor networks[A].Proc 2003 IEEE Symp on Security and Privacy[C].Berkeley,California,2003:197.
  • 3Blundo C,Santis A D,Herzberg A,Kutten S,Vaccaro U,Yung M.Perfectly secure key distribution for dynamic conferences[A].Proc 12th Annual Int'l Cryptology Conf on Advances in Cryptology[C].Santa Barbara,California,1992:471~486.

同被引文献17

  • 1肖德贵,杨金,罗娟.基于多项式和分组的无线传感器网络密钥管理方案[J].计算机应用研究,2009,26(2):680-682. 被引量:9
  • 2蔡晓,杨庚,王江涛.一种基于位置信息的WSN随机密钥预分配方法[J].南京邮电大学学报(自然科学版),2007,27(1):20-24. 被引量:5
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4ESCHENAUER L, GLIGOR V D. A key-nmnagement scheme for distributed sensor networks[ C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. New York: ACM Press, 2002:41-47.
  • 5LIU D G, NING P. Location-based pairwise key establishments for static sensor networks[ C]// Proceedings of the 1 st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003:72-82.
  • 6CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[ C]// Proceedings of 2003 Symposium on Security and Privacy. Washington, D C: IEEE Computer Society, 2003:197-213.
  • 7DU W, DENG J, HAN Y S, et al. A pairwise key predistribution seheme for wireless sensor networks[ C]// Proeeedings of the 10th ACM Conferenee on Computer and Communieations Seeurity. New-York: ACM Press, 2003:42-51.
  • 8BLOM R. An optimal class of symmetric key generation systems [ C]// Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographie Techniques, LNCS 209. New York: Spring-Verlag, 1984:335-338.
  • 9AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. A survey on sensor networks[ J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 10CHENG YI, AGRAWAL D P. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J]. Ad Hoc Networks, 2007, 16(5): 35-48.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部