期刊文献+

基于部署信息的无线传感器网络配对密钥方案 被引量:4

KPSBM:pairwise key pre-distribution scheme for wireless sensor networks based on deployment knowledge
下载PDF
导出
摘要 在充分考虑无线传感器网络自身特点的基础上,针对现有无线传感器网络密钥管理中存在的问题,利用Blom矩阵,提出了一个基于部署信息的无线传感器网络密钥管理方案(KPSBM),并从该方案的安全性、连通性、可扩展性、有效性等方面进行分析,并与现有的一些常用方案进行了分析比较,结果表明,KPSBM在这些方面有较好的性能。 According to the characteristics of Wireless Sensor Networks (WSN) and the defects in current key management schemes,a key management scheme(KPSBM) based on deployment knowledge is presented using Blom matrix.Then,the scheme is analyzed from security,key connecfivity,scalability and efficiency.Compared with some current popular schemes,KPSBM achieves better performance.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第20期4-6,10,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60702037) 教育部博士点学科基金项目(Doctoral Fund of Ministry of Education of China under Grant No.20030056007) 中国博士后科学基金(China Postdoctoral Science Foundationunder Grant No.2006040018)
关键词 无线传感器网络 密钥管理 Blom矩阵 Wireless Sensor Networks(WSN) key management Blom matrix
  • 相关文献

参考文献11

  • 1Akyildiz Ian F,Su Weilian,Sankarasubramaniam Yogesh,et al.A survey on sensor networks[J].IEEE Communications Magazine,2002, 40(8) : 102-114. 被引量:1
  • 2苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 3Eschenauer L,Gligor V.A key management scheme for distributed sensor networks[C]//Proc of the 9th ACM Conf on Computer and Communications Security, Washington, DC, 2002: 41-47. 被引量:1
  • 4Zhu S,Setia S.LEAP:efficient security mechanisms for large-scale distributed sensor networks[C]//Proc of the lOth ACM Conf on Computer and Communications Security, Washington, DC, 2003 : 62-72. 被引量:1
  • 5Perrigy A,Szewczyk R.SPINS:security protocols for sensor networks[J]. Wireless Networks,2002,8 (5) : 521-534. 被引量:1
  • 6Du Wengliang,Deng Jing.A pairwise key predistribution scheme for wireless sensor networks[C]//Proc of the 10th ACM Conf on Computer and Communications Security(CCS), Washington, DC, 2003 : 42-51. 被引量:1
  • 7Wander A S,Gura N,Eberle H,et al.Energy analysis of public-key cryptography for wireless sensor networks[M].New York:Pervasive Computing and Communications,2005:324-328. 被引量:1
  • 8YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 9Zhang Yanchao,Liu Wei,Lou Wenjing,et al.Location-based compromise-tolerant security mechanisms for wireless sensor networks[J]. IEEE Journal on Selected Areas in Commnuications,2006,24(2): 247-260. 被引量:1
  • 10Blom R.An optimal class of symmetric key generation systems[C]// Thomas Beth,Norbert Cot,Ingemar Ingemarsson.Lecture Notes in Computer Science:Advances in Cryptology,Proceedings of EUROCRYPT 84.Berlin, Heidelberg: Springer-Verlag, 1985 : 335-338. 被引量:1

二级参考文献29

  • 1Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks.Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM,2002:41-47 被引量:1
  • 2Liu D,Ning P.Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks,Proceedings of the 10th Annual Network and Distributed System Security Symposium(NDSS'03),Feb 6-7,2003,San Diego,CA,USA.2003:263-276 被引量:1
  • 3Liu D,Ning P.Multi-level TESLA:Broadcast authentication for distributed sensor networks.ACM Transactions in Embedded Computing Systems(TECS),2004,3(4):800-836 被引量:1
  • 4Di Pietro R,Mancini L V,Mei A.Random key assignment for secure wireless sensor networks.Proceedings of ACM Workshop on Security in Ad Hoc and Sensor Networks(SASN'03),Oct 31,2003.Fairfax.VA,USA.New York,NY,USA:ACM,2003,62-71 被引量:1
  • 5Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.Proceedings of IEEE Symposium on Research in Security and Privacy,May 11-14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213 被引量:1
  • 6Liu D,Ning P.Location-based pairwise key establishments for static sensor networks.Proceedings of ACM Workshop on Security in Ad Hoc and Sensor Networks(SASN'03),Oct 31,2003,Fair fax,VA,USA.New York,NY,USA:ACM,2003,72-82 被引量:1
  • 7Anderson R,Kuhn M.Tamper resistance-A cautionary note.Proceedings of the 2nd USENIX Workshop on Electronic Commerce,Nov 18-21,Oakland,CA,USA.San Dieogo,CA,USA:USENIX Press,1996:1-11 被引量:1
  • 8Blom R.An optimal class of symmetric key generation systems,Lecture Notes in Computer Science,Germany:1985:335-338 被引量:1
  • 9Ganesan P,Venugopalan R,Peddabachagari P,et al.Analyzing and modeling encryption overhead for sensor network nodes.Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications,Sep 19,2003,San Diego,CA,USA.New York,NY,USA:ACM,2003:151-159 被引量:1
  • 10Gura N,Patel A,Wander A,et al.Comparing elliptic curve cryptography and RSA on 8-bit CPUs.Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004),Aug 11-13,2004,Boston,MA,USA.Berlin,Germany:Springer-Verlag,2004:119-132 被引量:1

共引文献118

同被引文献25

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部