期刊文献+

基于动态多簇密钥管理模型的安全数据聚合方案 被引量:2

Data Aggregation Security Solution Based on Key Management Scheme of Dynamic Multi-cluster
下载PDF
导出
摘要 军事领域需要强有力的安全措施,但由于环境恶劣,缺乏物理保护,难以展开固定的通信设施。设计了一种基于身份的动态多簇密钥管理模型。该模型以簇为单位进行密钥管理,每个成员节点只需存储本簇的公钥因子矩阵,极大地节省了密钥存储空间,且可抵抗同谋攻击;密钥分发过程安全高效,节点加入和退出时密钥更新开销小;不依赖可信第三方便可实现身份认证,且不需要固定基础设施的支持。基于该模型提出了一种安全数据聚合方案。列举了部分可以抵御的攻击;讨论了该方案握手过程需要消耗的能量。结果显示,在新模型下将公钥密码体制用于无线传感器网络是可行的。 A dynamic multiple cluster key management model based on identity was designed in wireless sensor network.The key management in the model is cluster-based.Every node in the network is just required to store its private key and the public key factor matrix of the cluster that it belongs to,which consumes little storage space and can resist the collusion attack.The key distribution is secure and effective.It costs little during the node joining and leaving.And it realizes the identity authentication independent of the third party and has no use for infrastructure to sustain the key distribution center.A secure data aggregation solution based on the model was proposed.Security of the proposed solution was analyzed and some attacks that can be resisted were listed.The energy consumption during the handshaking process was discussed,which indicates that it is feasible to use the identity-based cryptography in the wireless sensor networks.
出处 《计算机科学》 CSCD 北大核心 2011年第9期36-40,共5页 Computer Science
基金 国家自然科学基金(60903175 60903196和60703048)资助
关键词 无线传感器网络 数据聚合 基于身份的公钥密码体制 密码系统 Wireless sensor networks Data aggregation IBE Cryptography
  • 相关文献

参考文献19

  • 1Eschenauer L,Gligor V D. A key-management scheme for distributed sensor networks [C] // Proceedings of the 9th ACM Conference on Computer and Communications Security. November 2002:41-47. 被引量:1
  • 2Liu D, Ning P. Establishing pairwise keys in distributed sensor networks[C]// Proceedings of 10th ACM Conference on Computer and Communications Security(CC, S03). October 2003:52- 61. 被引量:1
  • 3Girao J, Westhoff D, Schneider M. CDA: Concealed Data Aggregation for Reverse Multieast Traffic in Wireless Sensor Networks[C]//40th International Conference on Communications. IEEE ICC,May 2005. 被引量:1
  • 4Castelluccia C, Mykletun E, Tsudik G. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks[Z]. Mobiquitous, 2005. 被引量:1
  • 5Ren M. Random Key Predistribution for Wireless Sensor Networks Using[C]//8th Central European Conference on Cryptography. 2008. 被引量:1
  • 6Shamir A. Identity based cryptosystems and signature schemes [C]// Advances in Cryptology-proceedings of Crypto' 84. 被引量:1
  • 7Boneh D, Franklin M. Identity based encryption from the Weil pairing[C] /// Advances in Cryptology 2001, Lecture Notes in Computer Science. Vol. 2139, Springer-Verlag, Aug. 2001:231- 229. 被引量:1
  • 8南湘浩著..CPK标识认证[M].北京:国防工业出版社,2006:216.
  • 9徐鹏,崔国华,雷凤宇.非双线性映射下一种实用的和可证明安全的IBE方案[J].计算机研究与发展,2008,45(10):1687-1695. 被引量:10
  • 10Waters B. Dual System Encryptiont Realizing Fully Secure IBE and HIBE underSimple Assumptions [C] //CRYPTO 2009. 2009 : 619-636. 被引量:1

二级参考文献16

  • 1钟旭,陆浪如,南相浩,洪泽勤.一种基于种子密钥SPK的IBE加密体制设计方案[J].微计算机信息,2005,21(4):226-227. 被引量:12
  • 2陈华平,关志.关于CPK若干问题的说明[J].信息安全与通信保密,2007,29(9):47-49. 被引量:10
  • 3Shamir A. Identity based cryptosystems and signature schemes [C] //Blankley G T, Chaum D, eds. Advances in Cryptology--Proeeedings of CRYPTO'84, LNCS 196. Berlin: Springer, 1985:48-53 被引量:1
  • 4Boneh D, Franklin M. Identity-based encryption from the Well pairing [C] //Advances in Cryptology--Proc of Crypto'2001, LNCS 2139. Berlin; Springer, 2001:231-229 被引量:1
  • 5Boneh D, Boyen X. Efficient selective ID identity based encryption without random Oracles [C] //Advances in Cryptcdogy Proc of EUROCRYPT'2004, LNCS 3027. Berlin: Springer, 2004:223-238 被引量:1
  • 6Boneh D, Boyen X. Secure identity based encryption without random Oracles [C] //Advances in Cryptology Proc of Crypto'2004, LNCS 3152. Berlin: Springer, 2004:443-459 被引量:1
  • 7Waters B. Efficient identity-based eneryption without random Oracles [C] //Advances in Cryptology--Proc of EUROCRYPT'2005, LNCS 3494. Berlin: Springer, 2005: 114-127 被引量:1
  • 8Gentry C. Practical ientity based encyrption without random Oracles [C] //Advances in Cryptology--Proc of EUROCRYPT'2006, LNCS 4004. Berlin: Springer, 2006: 445-464 被引量:1
  • 9Galbraith S D. Supersingular curves in cryptography [C] //Advances in Cryptology--Proc of ASIACRYPT'2001, LNCS 2248. Berlin: Springer, 2001:495-513 被引量:1
  • 10Cocks Clifford. An identity based encryption sheme based on quadratic residues [C] //Proc of the 8th IMA Int Conf on Cryptography and Coding, LNCS 2260. Berlin: Springer, 2001:360-363 被引量:1

共引文献9

同被引文献36

  • 1潘承洞 潘承彪著.初等数论[M].北京:北京大学出版社,1994.190-191,241-242. 被引量:17
  • 2无线传感器网络协议与体系结构[M].邱天爽,译.北京:电子工业出版社,2007. 被引量:11
  • 3Wang Y,Attebury G,Ramamunhy B. A Survey of Security Issues in Wireless Sensor Networks [J]. Communications Surveys & Tutorials, 2006,8 (2) : 2-23. 被引量:1
  • 4Perrig A, Szewezyk R,Tygar J D,et al. SPINS: Security protocols for sensor networks [C]//Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking ( MobiCom'01 ). Rome: ACM Press, 2001 : 189-199. 被引量:1
  • 5Perrig A,Szewczyk R,Tygar J D,et al. Spins: security protocols for sensor networks [J]. Wireless Networks, 2002, 8(5) :521-534. 被引量:1
  • 6Lai B C, Hwang D D, Kim S P, et al. Reducing radio energy consumption of keymanagement protocols for wireless sensor networks [C]// ISLPED 04:Proceedings of the 2004 International Symposium on Low Power Electronics and Design. California USA ACM Press,2004:351-356. 被引量:1
  • 7Rosen K H. Elementary Number Theory and its Applications [M]. Boston, MA,USA: Addison-Wesley, 1988. 被引量:1
  • 8Chowla S,Friedlander J. Class numbers and quadratic residues [J]. Glasgow MathematicalJournal, 1976,17:47-52. 被引量:1
  • 9Patterson W. Mathematical Cryptology for Computer Scientists and Mathematicians [M]. Maryland,USA:Rowman Littlefield, 1987. 被引量:1
  • 10Buhler J P. Algorithmic number theory [M]. Portland, Oregon, USA: The MIT Press, 1998. 被引量:1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部