期刊文献+

一种WSN簇头更换过程中的信息转移方法 被引量:2

A Method of Information Transfer in the Process of WSN Cluster Head Replacement
下载PDF
导出
摘要 提出簇ID的概念,在此基础上提出了一种簇头更换过程中将路由信息、密钥信息转移到下一个簇头节点的方法.利用簇ID通信时,可以直接发送数据包给下一跳节点内的簇ID,避免了查询簇头的繁琐过程,使簇头转移过程简化.根据现有簇头与簇头之间的簇间密钥,应用Diffie-Hellman算法生成新簇头节点间密钥,最后运用BAN逻辑的形式化分析方法,对该协议的安全性进行了证明. In this paper,the concept of cluster ID is put forward, and a new method is put forward based on which the routing information and key information are transferred to the next cluster head in the replacement process. When the cluster ID is used, the data packets can be sent directly to the cluster 1D in the next hop node, which can avoid the complicated process of the cluster head. According to the existing cluster key and application of Diffie Hellman algorithm generated key between the new cluster head nodes. Finally, we use formalization of BAN logic analysis method, the security of the protocol is proved.
出处 《微电子学与计算机》 CSCD 北大核心 2016年第5期147-152,共6页 Microelectronics & Computer
关键词 无线传感器网络 密钥管理 簇ID 簇间密钥 DIFFIE-HELLMAN BAN逻辑 Wireless sensor network key management cluster ID cluster key^Dif{ie-Hellman BANlogic
  • 相关文献

参考文献10

二级参考文献34

  • 1陈丹,郑增威,李际军.无线传感器网络研究综述[J].计算机测量与控制,2004,12(8):701-704. 被引量:100
  • 2李晖,彭志威,陈克非.无线传感器网络及其安全问题[J].中兴通讯技术,2004,10(B10):30-34. 被引量:13
  • 3程宏兵,王江涛,杨庚.SPINS安全框架协议研究[J].计算机科学,2006,33(8):106-108. 被引量:10
  • 4李腊元,李春林.计算机网络[M].北京:国防工业出版社,2004. 被引量:2
  • 5Perrig A,Szewezyk R,Wen V,et al.SPINS; Security Protocols for Sensor Networks[C]//Mobile Computing and Networking 2001 Rome,Italy. 被引量:1
  • 6Eschenauer L,Gligor V D.A Key Management Scheme for Distributed Sensor Networks[C]//Proceed-ings of the 9th ACM Conference on Computer and Communication Security,2002.-41-47. 被引量:1
  • 7Zhu S,Setia S,Jajodia S.LEAP:Efficient Secure Mechanisms for Large-seale Distributed Sensor Networks[C]// The 10th ACM Conference on Computer and Communications Security (CCS'03),Washington D.C.,October,2003. 被引量:1
  • 8Akyildiz L F,Weilian S,Sankarasubramaniam Y,Cayirci E.A survey on sensor networks[J].IEEE Communications Magazine,2002,40(8):102-114. 被引量:1
  • 9Sourabi K,Gao J,Allawadni V,Pottie G J.Protocols for self-organization of a wireless sensor network[J].IEEE Personal Communications,2000,7(5):16-27. 被引量:1
  • 10Eschenauer L,Gligor V D.A key-management scheme for sensor networks[A].The 9^th ACM Conference on Computer and Communication Security (CCS)[C].Washington DC,USA,Nov.2002:41-47. 被引量:1

共引文献57

同被引文献18

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部