高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种有效的无线传感器网络广播密钥管理方案

吴亮 曹晓梅 杨庚 李大伟

吴亮, 曹晓梅, 杨庚, 李大伟. 一种有效的无线传感器网络广播密钥管理方案[J]. 电子与信息学报, 2010, 32(6): 1480-1484. doi: 10.3724/SP.J.1146.2009.00892
引用本文: 吴亮, 曹晓梅, 杨庚, 李大伟. 一种有效的无线传感器网络广播密钥管理方案[J]. 电子与信息学报, 2010, 32(6): 1480-1484. doi: 10.3724/SP.J.1146.2009.00892
Wu Liang, Cao Xiao-mei, Yang Geng, Li Da-wei. An Efficient Broadcast Key Management Policy in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2010, 32(6): 1480-1484. doi: 10.3724/SP.J.1146.2009.00892
Citation: Wu Liang, Cao Xiao-mei, Yang Geng, Li Da-wei. An Efficient Broadcast Key Management Policy in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2010, 32(6): 1480-1484. doi: 10.3724/SP.J.1146.2009.00892

一种有效的无线传感器网络广播密钥管理方案

doi: 10.3724/SP.J.1146.2009.00892

An Efficient Broadcast Key Management Policy in Wireless Sensor Networks

  • 摘要: 无线传感器网络具有自组织、自管理和能量有限等特性,使其安全性面临严峻的挑战。该文在分析现存组播密钥管理方案的基础上,提出了一种基于BIP(Broadcast Incremental Protocol)和EBS(Exclusion Basis Systems)算法的广播密钥管理方案EBKMP。该方案对生成的广播树进行分组,根据相邻组间海明距离尽量小的原则分配密钥,增强安全性同时有效降低了组成员异动引起的密钥更新消耗。通过与几种经典密钥管理方案对比,证明EBKMP在通信、存储性能和抗合谋攻击能力等方面有显著改善。
  • 邱慧敏, 杨义先, 钮心忻. 无线传感器网络中广播通信的安全协议设计[J]. 北京邮电大学学报, 2006, 29(5): 53-57.[2]Qiu H M, Yang Y X, and Niu X X. Security protocol design about broadcast in wireless sensor network[J]. Journal of Beiing University of Posts and Telecommunications, 2006 29(5): 53-57.[3]Boukerche A, Ren Y L, and Samarah S. A secure key management scheme for wireless and mobile Ad hoc networks using frequency-based approach: proof and correctness. IEEE GLOBECOM 2008 NEW ORLEANS, LA, USA, Dec., 2008: 1-5.[4]Lu K J, Qian Y, Guizani M, and Chen H H. A framework for a distributed key management scheme in heterogeneous wireless sensor networks[J].IEEE Transactions on Wireless Communications.2008, 7(2):639-647[5]Aparna R and Amberker B B. Authenticated secure group communication using broadcast encryption key computation. ITNG 2008. Fifth International Conference on Las Vegas, Nevada, USA, 2008: 348-353.[6]Yan J Z, Ma J F, and Liu H Y. Key hierarchies for hierarchical access control in secure group communications. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2009, 53(3): 353-364.[7]Boneh D and Hamburg M. Generalized identity based and broadcast encryption schemes. Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology 2008, Melbourne, Australia, December 2008: 455-470.[8]沈玉龙, 裴庆祺, 马建峰. MMTESLA: 多基站传感器网络广播认证协议[J]. 计算机学报, 2007, 30(4): 539-546.Shen Y L, Pei Q Q, and Ma J F. MMTESLA: Broadcast authentication protocol for Multiple-Base-Station sensor networks[J]. Chinese Journal of Computer, 2007, 30(4): 539-546.[9]Wallner D, Harder E, and Agee R. Keymanagement for multicast: Issues and Architectures. RFC 2627, June 1999.[10]Wong C K and Lam S. Secure group communications using key graphs. Proc. ACM SIGCOMM 98 Conference in Vancouver, 1998: 68-79.[11]Canetti R.[J].Garay J, Itkis G, Micciancio K, and Naor M. Multicast security: a taxonomy and some efficient constructions. Proc. INFOCOM99, New York, NY.1999,:-Chang I.[J].Engel R, Pendarakis D, and Saha D. Key management for secure internet multicast using boolean function minimization techniques. Proc. INFOCOM99, New York, NY.1999,:-[12]Perrig A, Song D, and Tygar J D. ELK. A new protocol for efficient large group key distribution. IEEE Security and Privacy 2001, Oakland, California, USA, 2001: 247-262.[13]Son J H, Lee J S, and Seo S W. Energy efficient group key management scheme for wireless sensor networks. COMSWARE 2007. 2nd International Conference Bangalore, India, Jan. 7-12, 2007: 1-9.[14]Mohamed E, Ashraf W, and Stephan O, et al.. Group key management scheme for large-scale sensor networks[J].Ad hoc Networks.2005, 3(5):668-688[15]Jeffery E W and Gam D N. Energy-efficient broadcast and multicast trees in wireless networks[J].Mobile Networks and Applications.2002, 7(6):481-492
  • 加载中
计量
  • 文章访问数:  3316
  • HTML全文浏览量:  72
  • PDF下载量:  708
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-06-19
  • 修回日期:  2009-09-28
  • 刊出日期:  2010-06-19

目录

    /

    返回文章
    返回