期刊文献+

存储最优的传感器网络密钥共享 被引量:1

Storage-Optimal Key Sharing with Authentication in Sensor Networks
在线阅读 下载PDF
导出
摘要 基于双线性函数,提出了一个存储最优的传感器网络密钥共享方法,指出了当前密钥管理协议在传感器网络中的不适用性。并对该共享方法的安全性和性能(存储、计算、通信)进行了分析。与其他方法相比,具有以下优点:(1)存储最优,只要求每个节点保存一个密钥和H ash函数,存储量与网络规模无关;(2)网络是确定连通的;(3)具有节点鉴别能力。因此,该方法能在较低耗费的前提下实现安全的、存储最优的、确定连通的传感器网络密钥共享。 A storage-optimal key sharing scheme with authentication is presented based on bilinear mapping. The secure communications over the resource constrained devices are extended. And its security and the overload(including storage, computation and communication) are analyzed. Compared with the previously proposed schemes, the scheme has the following advantages: (1)It is optimal in memory consumption. Each sensor node is only required to hold one secret key and Hash functions, which is independent of the scale of network; (2)The sensor network is guaranteed to be wholly connected; (3)The node authentication is also provided. Finally, the result proves that the scheme is secure, storage optimal, and deterministically wholly-connected with the moderate energy consumption.
作者 王箭
出处 《南京航空航天大学学报》 EI CAS CSCD 北大核心 2006年第6期692-696,共5页 Journal of Nanjing University of Aeronautics & Astronautics
关键词 无线传感器网络(WSN) 密钥共享 带鉴别的密钥共享 wireless sensor network(WSN) key sharing key sharing with authentication
  • 相关文献

参考文献13

  • 1Warneke M,Last B,Pister K.SmartDust:communicating with a cubic-millimeter computer[J].IEEE Computer,2001,34(1):44-51.
  • 2Akyildiz I,Su W,Sankarasubramanian Y,et al.Wireless sensor networks:a survey[J].Computer Networks,Elsevier Science,2002,38(4):393-422.
  • 3Carman D,Kruus P,Matt B.Constraints and approaches for distributed sensor networks security[EB/OL].[2006-05-10].http://download.nai.com/products/nai/zip/nailabsreport-00-010-tinal.zip.
  • 4Jolly G,Kuscu M,Kokate P.A hierarchical key management method for low-energy wireless sensor networks[R].UMBC Online Document.Baltimore MD:University of Maryland,Baltimore County,2002.
  • 5Wadaa A,Olariu S,Wilson L,et al.Training a wireless sensor network[J].Mobile Networks and Applications,2005,10(1-2):151-168.
  • 6Perrig A,Stankovic J,Wagner D.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57.
  • 7Eltoweissy M,Heydari H,Morales L,et al.Combinatorial optimization for key management in secure multicast environments[J].Journal of Network and System Management,2004,12(1):30-50.
  • 8Camtepe S A,Yener B.Combinatorial design of key distribution mechanisms for wireless sensor networks[C]//Samarati P.Proc of 9th European Symposium on Research Computer Security.[S.l.]:Springer LNCS 3193,2004:293-308.
  • 9Chan Chunfai.Distributed symmetric key management for mobile ad hoc networks[C]//IEEE INFOCOM.HongKong:IEEE Communication Society,2004:2414-2424.
  • 10Wu Jiang,Wei Ruizhong.Comments on "distributed symmetric key management for mobile ad hoc networks" from INFOCOM 2004[EB/OL].[2006-05-10].http://eprint.iacr.org/2005/008.pdf.

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部