高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

分簇无线传感器网络中基于横截设计的对密钥建立方案

许力 章红艳 沈金波

许力, 章红艳, 沈金波. 分簇无线传感器网络中基于横截设计的对密钥建立方案[J]. 电子与信息学报, 2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564
引用本文: 许力, 章红艳, 沈金波. 分簇无线传感器网络中基于横截设计的对密钥建立方案[J]. 电子与信息学报, 2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564
Xu Li, Zhang Hong-yan, Shen Jin-bo. Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564
Citation: Xu Li, Zhang Hong-yan, Shen Jin-bo. Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564

分簇无线传感器网络中基于横截设计的对密钥建立方案

doi: 10.3724/SP.J.1146.2008.00564
基金项目: 

国家自然科学基金(60502047), 福建省教育厅重点项目(JA07030), 福建省高等学校新世纪优秀人才支持基金(FM035)和福建省自然科学基金项目(2008J0014)资助课题

Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks

  • 摘要: 由于节点能量有限、存贮空间小等特点,使传统的网络密钥管理方案受到挑战。该文基于横截设计、双变量多项式和门限机制,提出了适用于分簇结构传感器网络的对密钥建立方案和多路径密钥建立策略。该方案采用横截设计保证同簇内节点可以直接建立对密钥,而不同簇的节点可以基于门限机制构建多路径密钥。理论和实验分析表明,新方案在增强安全性、连通性和抗毁性的同时,有效地降低了通信量及密钥存储量等代价,并且具有良好的可扩展性。
  • Akyildiz F, Su W, Sankarasubra maniam Y, and Cayirci E.Wireless sensor network: A survey[J].Computer Networks.2002,38(4):393-422[2]Eschenauer L and Gligor V. A key management schemedistributed sensor network. Proceeding of the 9th ACMConference on Computer and Communications Security,Washington. New York: ACM Press, 2002: 41-47.[3]Chan H and Perrig A, et al.. Random key predistributionschemes for sensor networks. Proceeding of the 2003 IEEESymposium on Security and Privacy, Berkeley, California.IEEE Computer Society, 2003: 197-213.[4]Camtepe S A and Yener B. Combinatorial design of keydistribution mechanisms for wireless sensor networks.Proceeding of 9th European Symposium On Research inComputer Security, Berlin. Springer-Verlag, 2004: 293-308.[5]Hongmei Deng and Anindo Mukherjee, et al.. Threshold andidentity-based key management and authentication forwireless ad hoc networks[J].Porceeding of internationalconference on information technology: coding andcomputing(ITCC04), Washington. IEEE Computer Society.2004, 2:107-111[6]Farshid delgosha and Faramarz fekri. Threshold keyestablishmentin distributed sensor networks using amultivariate scheme. Proceeding of 25th IEEE InternationalConference on Compute Communications, Barcelona,Catalunya, Spain. April, 2006: 1-12.[7]Chen Jiangwei, Xu Li, and Mu Yi. A new group Rekeyingscheme based on t-packing designs for Ad hoc networks.Proceeding of the 2nd international conference on Scalableinformation systems, Suzhou, China, ACM Press, 2007, 304:110-115.[8]许力, 郑宝玉. MANET 环境下基于能量保护的路由策略及其研究进展[J].电子与信息学报.2005, 27(5):827-834浏览[9]Erdos P and Renyi A. On random graph. Published inMathematics. Debrecen. Hungary, 6. 1959: 290-297.[10]Liu D and Ning P. Establishing pairwise keys in distributedsensor networks. Proceeding of the 10th ACM Conference onComputer and Communications Security, Washington. NewYork: ACM Press, 2003: 52-61.[11]章静, 许力, 黄榕宁. 自组网中基于可信度的分簇策略. 第二届中国可信计算与信息安全学术会议, 中国石家庄. 武汉大学学报(理学版), 2006, 52(S1): 1-4.Zhang Jing, Xu Li, and Huang Rong-ning. Trustevaluation-based clustering algorithm in an ad hoc network.Proceeding of 2nd China Trusted Computing andInformation Security Conference, Shijiazhuang, China.Journal Wuhan University(Natural Science Edition), 2006,52(S1): 1-4.
  • 加载中
计量
  • 文章访问数:  3361
  • HTML全文浏览量:  119
  • PDF下载量:  845
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-05-08
  • 修回日期:  2009-03-16
  • 刊出日期:  2009-07-19

目录

    /

    返回文章
    返回