期刊文献+

传感器网络中建立路径密钥的增强方案 被引量:1

Enhanced Path-key Establishment Scheme in Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 针对传统密钥预分配方案中路径密钥建立路径长,通信开销大,且实施路径密钥建立阶段后,网络安全连通率增长速度不是很快等诸多问题,提出了一种建立路径密钥的增强方案.在路径密钥建立阶段,增强方案充分利用了节点通信范围内与其安全连通的邻节点中预分配的密钥,增加了用于路径密钥协商的节点的数量.对增强方案与无增强措施的原方案进行性能分析与比较,结果表明,实施增强方案后,网络安全连通率得到了明显的提高,使网络安全连通率可以很快达到1.同时,为达到预期的网络安全连通率,增强方案所需的预置密钥数目可以少得多. In the path-key establishment phase of existing pre-distribution key management schemes,there are many problems,such as long path-key establishment path,high communication overhead,and low secure network connectivity growth rate.In order to resolve these problems,an enhanced scheme for establishing the path-key is proposed.In path-key set up phase,the proposed scheme makes full use of the pre-distributed keys in the securely connected neighboring nodes within the communication range of the node,and increases the number of nodes used to negotiate the path-key.Analysis and comparison results between the enhanced scheme and the original scheme without the enhanced method show that with the enhanced scheme,secure network connectivity rate is obviously improved,and it achieves to 1 quickly.Moreover,the enhanced scheme needs much less pre-distributed keys to achieve the prospective network connectivity rate.
出处 《信息与控制》 CSCD 北大核心 2011年第2期268-272,共5页 Information and Control
基金 浙江省归国人员择优资助项目 杭州电子科技大学科学研究基金资助项目(KYF085609014)
关键词 无线传感器网络 密钥管理 密钥预分配 路径密钥 wireless sensor network(WSN) key management key pre-distribution path-key
  • 相关文献

参考文献13

  • 1Chen X Q, Makki K, Yen K, et al. Sensor network security: A survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.
  • 2Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]//ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2002: 41-47.
  • 3Chan H W, Perrig A, Song D. Random key predistribution schemes for sensor networks[C]//Symposium on Security and Privacy. Piscataway, NJ, USA: IEEE, 2003: 197-213.
  • 4Liu D G, Ning E Establishing pairwise keys in distributed sensor networks[C]//ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2003: 52-61.
  • 5Liu D G, Ning E Location-based pairwise key establishments for static sensor networks[C]//ACM Workshop on Security of Ad Hoc and Sensor Networks. New York, NY, USA: ACM, 2003: 72-82.
  • 6Yuan T, Ma J Q, Zhang S Y. Random key management using group deployment in large-scale sensor networks[C] //International Conference on Communications and Networking in China. Piscataway, NJ, USA: IEEE, 2008: 1167-1171.
  • 7Zhen Y, Yong G. A key management scheme using deployment knowledge for wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(10): 1411-1425.
  • 8Wen J, Peng Y L, Huang W W, et al. Multiple hash key predistribution scheme based on adjacent deployment in sensor networks[C]//Chinese Control and Decision Conference. Piscataway, NJ, USA: IEEE, 2008: 3256-3260.
  • 9Liu D G, Ning P, Du W L. Group-based key predistribution for wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2008, 4(2): 1-30.
  • 10Wang J, Xia L N, Jing J W. Analysis for location-based key pre-distribution in wireless sensor networks[C]//International Conference on Information and Computing Science: Olympus: vol.2. Piscataway, NJ, USA: IEEE, 2009: 297-300.

同被引文献14

  • 1李洋,方滨兴,郭莉,陈友.基于直推式方法的网络异常检测方法[J].软件学报,2007,18(10):2595-2604. 被引量:26
  • 2Tan D Z, Jing N S, Shi Z, et al. Research on encrypt algo- rithm apply in WSN[J]. Advanced Materials Research, 2012, 433-440: 4625-4629.
  • 3Bechkit W. New key management schemes for resource con- strained wireless sensor networks[C]//Proceedings of 2011 In- ternational Symposium on a World of Wireless, Mobile and Multimedia Networks. Piscataway, NJ, USA: IEEE, 2011: 1-3.
  • 4Mainivannan D, Vijayalashmi B, Neellamegam R An efficient authentication protocol based on congruence for wireless sen- sor networks[C]//Proceedings of 2011 International Conference on Recent Trends in Information Technology. Piscataway, NJ, USA: IEEE, 2011: 549-554.
  • 5Li W, Chen M, Li M M. Information security routing protocol in the WSN[C]//Proceedings of Fifth International Conference on Information Assurance and Security. Piscataway, NJ, USA: IEEE, 2009: 651-656.
  • 6Misra S, Krishna V, Abraham I. A simple learning automata- based solution for intrusion detection in wireless sensor net- works[J]. Wireless Communications and Mobile Computing, 2011(11): 426-441.
  • 7Rassam M A, Maarof M A, Zainal A. A novel intrusion detec- tion framework for wireless sensor networks[C]//Proceedings of 7th International Conference on Information Assurance and Se- curity. Piscataway, NJ, USA: IEEE, 2011: 350-353.
  • 8Wang S S, Yan K Q, Wang S C, et al. An integrated intrusion detection system for cluster-based wireless sensor networks[J]. Expert Systems with Application, 2011, 38(12): 15234-15243.
  • 9Yu Z W. An adaptive Automatically tuning intrusion detection system[D]. Chicago: University of Illinois, 2007.
  • 10Livani A M, Abadi M. A PCA-based distributed approach for intrusion detection in wireless sensor networks[C]//Proceedings of 2011 International Symposium on Computer Networks and Distributed System. Piscataway, N J, USA: IEEE, 2011: 55-60.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部