期刊文献+

适合于无线传感器网络的混合式组密钥管理方案 被引量:12

Hybird group key management scheme for wireless sensor networks
在线阅读 下载PDF
导出
摘要 针对无线传感器网络中经常出现节点加入或退出网络的情况,提出了一种安全有效的混合式组密钥管理方案。多播报文的加密和节点加入时的组密钥更新,采用了对称加密技术;而系统建立后,组密钥的分发和节点退出后的组密钥更新,采用了基于身份的公钥广播加密方法。方案可抗同谋、具有前向保密性、后向保密性等安全性质。与典型组密钥管理方案相比,方案在适当增加计算开销的情况下,有效降低了节点的存储开销和组密钥更新通信开销。由于节点的存储量、组密钥更新开销独立于群组大小,方案具有较好的扩展性,适合应用于无线传感器网络环境。 Since sensor nodes join or leave the wireless sensor networks frequently,it is necessary to build a secure and efficient group key management system.An efficient and secure group key management scheme was proposed.Private-key cryptosystems are used to encrypt multicast messages and rekey the group when new nodes join the group,while the tech-nology of identity-based broadcast encryption is used to distribute the group key and rekey the group when nodes leave the group.The proposed scheme satisfies the desired security properties,such as forward secrecy,backward secrecy and collusion resistant.Compared with existing group key management schemes in wireless sensor networks,the scheme can efficiently reduce key storage and communication overhead of rekeying messages.As storage overhead and rekeying cost of nodes are not dependent of the scale of networks,the proposed scheme is applicable to wireless sensor networks.
作者 陈燕俐 杨庚
出处 《通信学报》 EI CSCD 北大核心 2010年第11期56-64,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60873231) 江苏省高校自然科学基金资助项目(08KJB520006) 网络安全与密码技术福建省高校重点实验室开放课题基金资助项目(09A010)~~
关键词 组密钥管理 无线传感器网络 广播加密 组密钥更新 group key management wireless sensor networks broadcast encryption multicast rekeying
  • 相关文献

参考文献3

二级参考文献30

  • 1J H Son, J S Lee, S W Seo. Energy efficient group key management scheme for wireless sensor networks [ A ]. In Proceedings of the 2rid International Conference on Communication Systems Software and Middleware [ C]. Bangatore, India: IEEE Press,2007.1 - 9.
  • 2B Panja, S K Madria, B Bhargava. Energy and communication efficient group key management protocol for hierarchical sensor networks[A] .In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing[ C ]. Taichung, Taiwan: IEEE Press, 2006.384 - 393.
  • 3Z Qingguang, C Yanling, L Juan. A lightweight key management protocol for hierarchical sensor networks[A] .In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies [ C ]. Taiwan: IEEE Press, 2006. 379 - 382.
  • 4M Eltoweissy, M H Heydari, L Morales, et al. Combinatorial optimization of group key management[J]. Jotlmal of Network and Systems Management: Special Issue on Network Security, 2004,12(1 ) :33 - 50.
  • 5J M Kim,J S Cho,S M Jung,et al.An energy-efficient dynamic key management in wireless sensor networks [ A ]. In Proce.edings of the 9th International Conference on Advanced Communication Technology [ C ]. Phoenix Park, Korea: IEEE Press,2006.2148 - 2153.
  • 6M Moharram, R Mukkamala, M Eltoweissy. TKGS: Threshold- based key generation scheme for wireless Ad Hoc networks [ A]. In Proceedings of the IEEE International Conference on Computer Communications and Networking [ C ]. Chicago, IL, USA: IEEE Press, 2004.31 - 36.
  • 7R Mukkamala, M Moharram, M Eltoweissy. A novel architecture for secure group communication in wireless Ad-Hoc net- works with application-level multicast [ A ]. In Proceedings of the 3rd International Trusted Intemet Workshop[ C 1. Bangalore, India: 2004.
  • 8M F Younis, K Ghumman, M Eltoweissy. Location-aware combinatorial key management scheme for clustered sensor net-works[ J ]. IEEE Transactions on Parallel and Distributed Systems, 2006,17 ( 8 ) : 865 - 882.
  • 9Z Xinliang, H Chin-Tser,M Manton. Chinese remainder theorem based group key management [ A ]. In Proceedings of the 45th ACM Southeast Conference ( ACMSE 2007 ) [ C ]. Winston-Salem, North Carolina, USA: ACM Press, 2007. 266 - 271.
  • 10D Naor, M Naor, J Lotspiech. Revocation and tracing schemes for stateless receivers [ A ]. In Proceedings of Advances in Cryptology - CRYPTO 2001 [ C ]. Santa Barbara, California, USA: Springer, 2001.41 - 62.

共引文献27

同被引文献54

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:732
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4Akyildiz I F,Su Wei,Sankarasubramaniam Y,et al.Wireless Sensor Networks:A Survey[J].Computer Networks,2002,38(4):393-422.
  • 5Perrig A,Standovic J,Wagner D.Security in Wireless Sensor Networks[J].Communications of ACM,2004,47(6):53-57.
  • 6Eschenauer L,Gligor D V.A Key-management Scheme for Distributed Sensor Networks[C]//Proc.of ACM Conference on Computer and Communications Security.Washington D.C.,USA:ACM Press,2002:41-47.
  • 7Chan Haowen,Perrig A,Song D.Random Key Predistribution Schemes for Sensor Networks[C]//Proc.of IEEE Symposium on Security and Privacy.[S.l.]:IEEE Press,2003:197-213.
  • 8Du Wenliang,Deng Jing,Han Yunghsiang,et al.A Pairwise Key Predistribution Scheme for Wireless Sensor Networks[C]//Proc.of ACM Conference on Computer and Communications Security.[S.l.]:IEEE Press,2003:42-51.
  • 9Liu Donggang,Peng Ning.Establishing Pairwise Keys in Distributed Sensor Networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 10Du Wenliang,Deng Jing,Han Yunghsiang,et al.A Key Manage-ment Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]//Proc.of IEEE Conference on Computer Communications.[S.l.]:IEEE Press,2004:586-597.

引证文献12

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部