期刊文献+

基于HNN的密钥共享机制研究

Research on HNN-based sharing mechanism of secret key
下载PDF
导出
摘要 安全与认证问题一直是无线传感器网络所面临的棘手难题之一,尤其是在有敌意的环境中。针对无线传感器网络通信内容易被窃听和篡改的问题,提出了一种基于Hopfield神经网络(HNN)的密钥共享协议。该协议通过利用HNN的收敛特性,在任意两个节点之间建立安全通信所需的共享密钥,同时将密钥量化为i位字符串以防止暴力破解攻击。最后实例化验证了此方案的有效性。 Security and authentication have been one of thorny problems in wireless sensor networks, especially in a hostile environment. Aiming at the problem of eavesdropping and tampering with the contents in wireless sensor network communication, a secret key sharing protocol based on Hopfield neural network (HNN) is proposed. By using the convergence characteristics of HNN, the sharing secret key needed by safety communication is established between any two nodes, in which the key is quantified into i-bit character string to prevent brute force attack. The effectiveness of the scheme is proved by instantiation.
出处 《现代电子技术》 2013年第15期84-87,共4页 Modern Electronics Technique
基金 国家发改委CNGI产业化资助项目(CNGI-09-02-07) 国家自然科学基金资助项目(71004901 61172018) 陕西省教育厅科学研究计划自然科学项目(12JK0944 2013JK1120 2013JK1139) 陕西省西安市碑林区科技项目
关键词 无线传感网络 密钥共享 安全通信 HOPFIELD神经网络 wireless sensor network key sharing safety communication Hopfield neural network
  • 相关文献

参考文献7

  • 1NEUMAN B C, TS'O T. Kerberos: an authentication service for computer networks [J]. IEEE Communications Magazine, 1994, 32(9): 33-38.
  • 2RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communica- tions of the ACM, 1978, 21(2): 120-126.
  • 3CHAN H W, PERRIG A, SONG D. Random key predistribu- tion schemes for sensor networks [C]// Proceedings of 2003 IEEE Symposium on Security and Privacy. Berkeley, CA, USA: IEEE, 2003: 197-213.
  • 4ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington DC, USA: ACM, 2002: 41-47.
  • 5DU W L, DENG J, HAN Yunghsiang, et al. A pairwise key predistribution scheme for wireless sensor networks [J]. ACM Transactions on Information and System Security, 2005, 8 (2) : 228-258.
  • 6DIFFIE W, HELLMAN M E. New directions in cryptography [J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 7SINGH A, MAHESHWARI M, NIKHIL, et al. Security and Trust Management in MANET [J]. Communications in Computer and Information Science, 2011, 147: 384-387.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部