期刊文献+

一种适用于高度易失传输环境的群钥分发协议

A Group-Key Distribution Protocol for Highly Lossy Transmission Environment
下载PDF
导出
摘要 构造一个具有自恢复能力和抵御合谋攻击能力的组群密钥发布协议,该协议特别适合于高度易失传输环境,例如无线传感器网络.基本方法是在时域上应用拉格朗日插值技术实现秘密分割—重构方案.本文精确叙述了该类协议应满足的安全性质,证明了该构造满足所要求的安全性质,分析了它对计算、存储及带宽资源的要求,并给出分别针对带宽和存储量的两种优化改进方案.论文还讨论了协议的参数选择问题. A group-key distribution protocol is designed which has the capability of self-recovery and coalitionattack-resisting, particularly suitable for highly lossy transmission environment such as wireless sensor networks. The basic method applies Langrange interpolation techniques in time-domain to implement a secrecy fragmentation-recon- struction scheme. This paper precisely specifies the desired security properties, proves the constructed scheme to satisfy all desired properties, analyzes the requirements on computation, storage and bandwidth resources, and proposes two improvements with respect to bandwidth apd storage optimization. This paper also discusses the parameter selection problem.
出处 《信息与控制》 CSCD 北大核心 2007年第1期39-46,共8页 Information and Control
基金 国家自然科学基金资助项目(94012007)
关键词 传感器网络 自恢复 组播 群钥 . sensor network self-recoveryg muhicast group key
  • 相关文献

参考文献11

  • 1Carman D W,Kruus P S,Matt B J.Constraints and Approaches for Distributed Sensor Network Security[R].New Jersey:NAI Labs,2002. 被引量:1
  • 2Akyildiz I F,Su W L,Sankarasubramaniam Y,et al.A survey on sensor networks[J].IEEE Communications Magazine,2000,40(8):102 ~114. 被引量:1
  • 3Canetti R,Garay J,Itkis G,et al.Multicast security:A taxonomy and some efficient constructions[A].Proceedings of the 1999 18th Annual Joint Conference of the IEEE Computer and Communications Society[C].Piscataway,NJ,USA:IEEE,1999.708 ~716. 被引量:1
  • 4Perrig A,Song D,Tygar J D.ELK,a new protocol for efficient large-group key distribution[A].Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy[C].Piscataway,NJ,USA:IEEE,2001.247 ~262. 被引量:1
  • 5Wong C K,Gouda M,Lam S S.Secure group communication using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16~30. 被引量:1
  • 6Perrig A,Szewczyk R,Wen V,et al.SPINS:Security protocols for sensor networks[J].Wireless Networks,2002,8 (5):521 ~534 被引量:1
  • 7Perrig A,Canetti R,Song D,et al.Efficient and secure source authentication for multicast[A].Proceedings of the 8th Annual Symposium on Network and Distributed System Security[C].Reston,VA,USA:Internet Society,2001.8 ~ 9. 被引量:1
  • 8Blundo C,De Santis A,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences[J].Information and Computation,1998,146(1):1 ~23. 被引量:1
  • 9Goldreich O.密码学基础[M].温巧燕,杨义先,译.北京:人民邮电出版社,2003. 被引量:2
  • 10胡磊,王鹏.应用密码学手册[M].北京:电子工业出版社,2005. 被引量:7

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部