期刊文献+

基于秘密共享的无线传感器网络广播密钥分发协议 被引量:4

Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing
在线阅读 下载PDF
导出
摘要 在无线传感器网络中,能量消耗主要集中在节点之间的通信上,节点计算所消耗的能量远小于通信所消耗的能量。由于无线传感器网络的"一对多"和"多对一"通信模式,广播是节约能量的主要通信方式。为了保证广播实体和消息的合法性和保密性,必须首先解决无线传感器网络广播密钥安全分发问题。本文在充分考虑无线传感器网络自身特点的基础上,基于Shamir的门限秘密共享方案,提出了椭圆曲线双线性对上的无线传感器网络广播密钥分发协议,并对其进行安全性和性能分析。分析发现,该协议不仅满足安全性要求,同时,能够适合无线传感器网络的特殊应用要求。 In wireless sensor networks, the most energy-consuming operation is the communication among network nodes. The energy consumed in communication is much less than that in computation. The broadcasting is one of the most energy-saving forms in communication because of the communication modes of One-To-Many and Many-To-One. To assure the validity of the entity and the privacy of the message, we should firstly solve the problem of the broadcast key secure distribution. Motivated by these concerns, on the enough consideration on the characteristics of wireless sensor networks, a broadcast key secure distribution protocol is proposed, in which Shamir's threshold secret sharing scheme and the ellipse curve bilinear pair are adopted. Then, security analysis and performance analysis are made on it. Analyses show that this protocol can be used to guarantee the security of wireless sensor networks, and at the same time, it can meet the special application requirements of wireless sensor networks.
出处 《传感技术学报》 CAS CSCD 北大核心 2008年第10期1775-1779,共5页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目资助(60803151) 陕西省自然科学基金项目资助(2007F37) 中国博士后科学基金资助(20070410376 20060401008) 教育部计算机网络与信息安全重点实验室(西安电子科技大学)开放基金资助课题(2008CNIS-07) 西北工业大学"翱翔之星"计划资助(2008年) 高等学校学科创新引智计划资助(B08038)
关键词 无线传感器网络 安全广播 密钥分发 椭圆曲线 wireless sensor networks secure broadcasting key distribution ellipse curve
  • 相关文献

参考文献15

  • 1覃伯平,周贤伟,杨军,李晓勤.基于无线传感器网络路由协议的安全机制研究[J].传感技术学报,2006,19(4):1276-1278. 被引量:15
  • 2覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 3Stephan O, Qingwen xu. Information Assurance in Wireless Sensor Networks[C]// Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS05, 2005.
  • 4IEEE P802. lli, Draft Supplement to STANDARD FOR Telecommunications and Information Exchange Between Systems -LAN/ MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Operation in Additional Regulatory Domains[S].
  • 5GB15629.112003/XG1-2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单》[S].中国标准出版社,2006年.
  • 6IEEE 802. 16e-2005. IEEE Standard for Local and metropolitan for Fixed Broadband Wireless Access Systems: Amendment 2 : Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands[S].
  • 7庞辽军,黄振海,郭宏等.一种增强无线城域网安全性的方法[P].专利号:ZL200410073156.9,授权公告日:2006年6月.
  • 8Perrig A. et al. SPINS: Security Protocols for Sensor Networks[J].Wireless Networks Journal (WINE), September 2002 8(5) : 521-534.
  • 9Liu D, Ning P. Multi-Level μTESLA: A Broadcast Authentication System for Distributed Sensor Networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3(4): 800-836.
  • 10Liu D, et al. Practical Broadcast Authentication in Sensor Networks[C]//Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. 2005:118-129.

二级参考文献48

共引文献55

同被引文献55

  • 1柳楠,韩芳溪,张维勇,程玉松.移动Ad hoc网络中的特殊攻击[J].计算机工程与设计,2005,26(6):1486-1487. 被引量:8
  • 2洪亮,洪帆,彭冰,陈晶.一种基于邻居信任评估的虫洞防御机制[J].计算机科学,2006,33(8):130-133. 被引量:18
  • 3沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 4苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 5Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks [J]. Wireless Networks, 2002, 8(5):521-534.
  • 6Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks [C]// 2nd ACM SensSys, 2004,162-175.
  • 7Gura N , Patel A , Wander A , et al. Comparing Elliptic Curve Cryptography and R SA on 8-bit CPUs[C]//Workshop on Cryptographic Hardware and Embedded Systems, 2004, 119-132.
  • 8Malan D J, Welsh M, and Smith M Do A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//IEEE International Conference on Sensor and Ad Hoe Communications and Networks, Santa Clara, California, 2004,71-80.
  • 9Zhang Y, Liu W, Lou W, and Fang Y. Securing Sensor Networks with Location-Based Keys[C]// IEEE Wireless Communications and Networking Conference. 2005, 1909-1914.
  • 10Doyle B, Bell S, Smeaton A F, McCusker K, et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks [J]. The Computer Journal, 2006, 49(4): 443-453.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部