期刊文献+

WSN中基于多项式的安全密钥建立方案

Polynomial-based Secure Key-establishment Scheme in Wireless Sensor Network
在线阅读 下载PDF
导出
摘要 针对分层WSN节点的更新,使用二元对称多项式,提出一种安全的建立通信双方会话密钥方案。该方案可保证传输消息的秘密性和完整性,能有效地抵御攻击者对消息的非法篡改、替换和重放。此外,该方案支持通信双方更新会话密钥和增加对节点身份的认证,防止非法节点的欺骗攻击。通过分析可知,该方案和现有方案相比,具有更高的安全性,以及成本和效率的合理性。 This paper puts forward a secure scheme to establish the session key between communication parties by use of binary symmetric polynomials, considering the hierarchical Wireless Sensor Networks(WSN) update, This scheme can guarantee the confidentiality and integrity of the message transmission, and can effectively resist the attacker's illegal tampering, replacement and replay to the message. Moreover, this scheme supports the session key update between communication parties and can enhance the authentication to the node identity so as to prevent the spoofing attack of the illegal nodes. Analysis shows that this scheme is more secure than others, and has reasonableness of cost and efficiency.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期126-128,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773083) 广东省自然科学基金资助项目(2006B15401002 8151063201000022)
关键词 密钥建立 对称多项式 会话密钥 无线传感器网络 key establishment symmetric polynomials session key Wireless Sensor Network(WSN)
  • 相关文献

参考文献6

  • 1Akyildiz F,Su Weilian,Sankarasubramaniam Y,et al.Wireless Sensor Network:A Survey[J].Computer Networks,2002,38(4):393-422.
  • 2张聚伟,孙雨耕.基于部署信息的无线传感器网络密钥管理方案[J].计算机工程,2009,35(6):145-147. 被引量:10
  • 3Jolly G,Kuscu M C,Kokate P,et al.A Low-energy Management Protocol for Wireless Sensor Networks[C]//Proceedings of the 8th IEEE International Symposium on Computers and Communication.Kemer,Antalya,Turkey:[s.n.],2003.
  • 4Cheng Yi,Agrawal D P.An Improved Key Distribution Mechanism for Large-scale Hierarchical Wtreless Sensor Networks[J].Ad Hoc Networks,2007,5(1):35-48.
  • 5Shen Anni,Guo Song,Leung V.A Flexible and Efficient Key Distribution Scheme for Renewable Wireless Sensor Networks[EB/OL].(2009-06-10).http://www.hindawi.com/journals/wcn/2009/240610.abs.html.
  • 6Wang Xiaoyun,Feng Dengguo,Lai Xuejia,et al.Collisions for Hash Functions MD4,MD5,HAVAL-128 and RIPEMD[EB/OL].(2004-08-17).http://eprint.iacr.org/2004/199.pdf.

二级参考文献10

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2Akyildiz I F, Weilian S, Yogesh S, et al. A Survey on Sensor Networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 3Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Networks[C]//Proc.of the 9th ACM Conf. on Computer and Communications Security. Washington D. C., USA: [s. n.], 2002: 41-47.
  • 4Zhu Sencun, Setia S. LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks[C]//Proc. of the 10th ACM Conf. on Computer and Communications Security. Washington, D. C., USA: ACM Press, 2003: 62-72.
  • 5Wander A S, Gura N, Eberle H, et al. Energy Analysis of Public-key Cryptography for Wireless Sensor Networks[C]//Proc. of the 3rd IEEE International Conference on Pervasive Computing. Galveston, Texas, USA: [s. n.], 2005: 324-328.
  • 6Geng Yang, Chunming Rong, Christian Veigner, et al. Identity-based Key Agreement and Encryption for Wireless Sensor Networks[J]. Journal of China Universities of Posts and Telecommunications, 2006, 13(4): 54-60.
  • 7Zhang Yanchao, Liu Wei, Lou Wenjing, et al. Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks[J]. IEEE Journal on Selected Areas in Commnuications, 2006, 24(2): 247-260.
  • 8Du Wenliang, Deng Jing, Yunghsiang S, et al. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]//Proc. of INFOCOM'04. Hong Kong, China: [s. n.] 2004.
  • 9Boneh D, Franklin M. Identify-based Encryption form the Weil Pairing[J]. Joumai of Computing, 2003, 32(3): 586-615.
  • 10Hankerson D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography[M]. New York, USA: Springer-Verlag, 2004.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部