期刊文献+

基于中国剩余定理的传感器网络密钥管理协议 被引量:5

A Novel Key Management Scheme Based on the Chinese Remainder Theorem for Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络的安全性是目前研究的热点。传统基于临时初始密钥和基于密钥池预分配的方案难以在网络连通性和节点存储计算消耗之间有效平衡,网络生命期内使用固定不变的初始密钥/密钥池难以抵抗节点捕获攻击。本文基于中国剩余定理提出了传感器网络密钥管理协议,每个节点携带较少的密钥素材,能够实现网络最大连通,并具有较少的存储空间和计算与通信能耗;基于时间概念分多个阶段部署传感器节点时,发布的密钥素材在不同的节点部署阶段相应变化,使得网络具有自愈合功能,从而具有较强的抗节点捕获攻击。 Research of security problem in wireless sensor networks (WSNs) is a challenging hotspot over the last ten years. Traditional schemes those based on temporary initial key and key pre-distribution using key pools are difficult to be tradeoff between the network connectivity and node storage space, and the same initial key or the key pool in these approaches is also vulnerable to against node capture attacks, this leaves key management as a fundamental research topic in the field of WSNs security. In this paper, a novel time-based key management scheme for WSNs using the Chinese Remainder Theorem is proposed, in our strategy each sensor node with fewer key material is deployed over different time stage, and the important parameter in key materials change correspondingly over time. We introduce the process of pair-wise key create, node addition and revocation, and show that the proposed key management solution can achieve maximum network connectivity with less energy consumption about communication and calculation, and also make the network has self-healing function and strong resistance to node capture attack.
作者 陈琳
出处 《传感技术学报》 CAS CSCD 北大核心 2014年第5期687-691,共5页 Chinese Journal of Sensors and Actuators
基金 湖北省自然科学基金项目(2011CDC126)
关键词 无线传感器网络 密钥管理 中国剩余定理 点对密钥 LEAP协议 wireless sensor networks key management china remainder theorem pairwise key LEAP protocol
  • 相关文献

参考文献13

  • 1Eschenauer L, Gligor V D.A Key-Management Scheme forDistributed Sensor Networks[C]/ / ACM CCS'02,2002:41-47.
  • 2Chan H,Perrig A,Song D.Random Key Predistribution Schemesfor Sensor Networks[C]/ / IEEE SP'03,2003:197-213.
  • 3Tian Biming, Han Song, Liu Liu, et al.Towards Enhanced KeyManagement in Multi-Phase ZigBee Network Architecture [J].Computer Communications 2012(35):579-588.
  • 4Arvind Seshadri, Mark Luk, Adrian Perrig.SAKE: SoftwareAttestation for Key Establishment in Sensor Networks[J].Ad HocNetworks,2011(9):1059-1067.
  • 5Zhu S,Setia S,Jajodia S.Leap:Efficient Security Mechanisms forLarge-Scale Distributed Sensor Networks[C]/ / ACM CCS,2003:62-72.
  • 6Liu Zhixin, Qing Chao, Zhen Ga, et al.A Distributed Energy-Efficient Clustering Algorithm with Improved Coverage in WirelessSensor Networks[J].Future Generation Computer Systems,2012(28):780-790.
  • 7Castelluccia C, Spognardi A.A Robust Key Pre-DistributionProtocol for Multiphase Wireless Sensor Networks [C]/ / IEEESecure Com,2007:351-360.
  • 8Jang J,Kwon T,Song J.A Time-Based Key Management Protocolfor Wireless Sensor Networks[C]/ / Information Security Practiceand Experience,2007:314-328.
  • 9王国军,吕婷婷,过敏意.无线传感器网络中基于临时初始密钥的密钥管理协议[J].传感技术学报,2007,20(7):1581-1586. 被引量:8
  • 10王秋华,汪云路,王小军,姜斌,游林.无线传感器网络中抗共谋的自愈组密钥分配方案[J].传感技术学报,2013,26(2):221-227. 被引量:4

二级参考文献37

  • 1郎为民,杨宗凯,吴世忠,谭运猛.无线传感器网络安全研究[J].计算机科学,2005,32(5):54-58. 被引量:27
  • 2王东安,张方舟,秦刚,南凯,阎保平.无线传感器网络安全协议的研究[J].计算机工程,2005,31(21):10-13. 被引量:12
  • 3李志军,秦志光,王佳昊.无线传感器网络密钥分配协议研究[J].计算机科学,2006,33(2):87-91. 被引量:9
  • 4覃伯平,周贤伟,杨军.无线传感器网络中密钥管理方案的综合评估[J].传感技术学报,2006,19(3):913-916. 被引量:5
  • 5王国军,王田,贾维嘉.无线传感器网络中一种基于行进启发的地理位置路由[J].传感技术学报,2007,20(2):382-386. 被引量:16
  • 6J H Son, J S Lee, S W Seo. Energy efficient group key management scheme for wireless sensor networks [ A ]. In Proceedings of the 2rid International Conference on Communication Systems Software and Middleware [ C]. Bangatore, India: IEEE Press,2007.1 - 9.
  • 7B Panja, S K Madria, B Bhargava. Energy and communication efficient group key management protocol for hierarchical sensor networks[A] .In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing[ C ]. Taichung, Taiwan: IEEE Press, 2006.384 - 393.
  • 8Z Qingguang, C Yanling, L Juan. A lightweight key management protocol for hierarchical sensor networks[A] .In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies [ C ]. Taiwan: IEEE Press, 2006. 379 - 382.
  • 9M Eltoweissy, M H Heydari, L Morales, et al. Combinatorial optimization of group key management[J]. Jotlmal of Network and Systems Management: Special Issue on Network Security, 2004,12(1 ) :33 - 50.
  • 10J M Kim,J S Cho,S M Jung,et al.An energy-efficient dynamic key management in wireless sensor networks [ A ]. In Proce.edings of the 9th International Conference on Advanced Communication Technology [ C ]. Phoenix Park, Korea: IEEE Press,2006.2148 - 2153.

共引文献17

同被引文献64

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2谷保平,许孝元,郭红艳.基于粒子群优化的k均值算法在网络入侵检测中的应用[J].计算机应用,2007,27(6):1368-1370. 被引量:24
  • 3王国军,吕婷婷,过敏意.无线传感器网络中基于临时初始密钥的密钥管理协议[J].传感技术学报,2007,20(7):1581-1586. 被引量:8
  • 4Ganeriwal S, Srivastava M. Reputation-Based Framework for High Integrity Sensor Networks [ J ]. ACM Transactions on Sensor Net- works,2008,4(3) : 1-37.
  • 5YAN S,ZHU H,LIU K J R. Defense of Trust Management Vulner- abilities in Distributed Networks[ J]. IEEE Communications Maga- zine,2008,46(2) :112-119.
  • 6Che Shenyun, Feng Renjian, Liang Xuan et al. A Lightweight Trust Management Based on Bayesian and Entropy for Wireless Sensor Networks [ J ]. Security and Communication Networks, 2014,8 (2) : 168-175.
  • 7Zhang Shibin, Chen Jianjun, Yang Junwei. Study on Cloud Trust Model Based on Cluster Structure for Wireless Sensor Networks [J]. Journal of Sichuan University,2014,46(6) :32-37.
  • 8Woo-Sik B. Formal Verification of an RFID Authentication Proto-col Based on Hash Function and Secret Code[j]. Wireless Person-al Communications, 2014,79(4) :2595-2609.
  • 9Zhou J. A Quadratic Residue-Based Lightweight RFID Mutual Au-thentication Protocol with Constant-Time Identification [J]. Jour-nal of Communications,2015,10(2).
  • 10Liu Z,Liu D, Li L,et al. Implementation of a New RFID Authenti-cation Protocol for EPC Gen2 Standard [J], Sensors Journal,IEEE,2015,15(2):1003-1011.

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部