[1]余旺科,马文平,陈和风,等.一种有效的无线传感器网络密钥管理方案[J].东南大学学报(自然科学版),2011,41(1):20-24.[doi:10.3969/j.issn.1001-0505.2011.01.005]
 Yu Wangke,Ma Wenping,Chen Hefeng,et al.Efficient key management scheme for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2011,41(1):20-24.[doi:10.3969/j.issn.1001-0505.2011.01.005]
点击复制

一种有效的无线传感器网络密钥管理方案()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
41
期数:
2011年第1期
页码:
20-24
栏目:
计算机科学与工程
出版日期:
2011-01-20

文章信息/Info

Title:
Efficient key management scheme for wireless sensor networks
作者:
余旺科12马文平1陈和风1高胜1
(1西安电子科技大学计算机网络和信息安全教育部重点实验室, 西安 710071)
(2绍兴文理学院数学系,绍兴 312000)
Author(s):
Yu Wangke12Ma Wenping1Chen Hefeng1Gao Sheng1
(1Ministry of Education Key Laboratory of Computer Network and Information Security, Xidian University, Xi’an 710071, China)
(2Department of Mathematics, Shaoxing University, Shaoxing 312000, China)
关键词:
无线传感器网络密钥管理双线性对安全
Keywords:
wireless sensor networks key management bilinear pairing security
分类号:
TP393.08
DOI:
10.3969/j.issn.1001-0505.2011.01.005
摘要:
针对无线传感器网络存储空间和带宽等局限性问题,提出了一种有效的无线传感器网络密钥管理方案.该方案采用椭圆曲线的双线性对加密技术对节点的身份进行认证,通过验证节点的合法性来抵抗非法节点的攻击.理论分析与仿真结果表明:当网络节点数为10~60时,节点存储密钥数只有2~12; 节点之间能相互验证密钥的有效性,可以抵抗假冒、重放和伪造等攻击.该方案在增强网络安全性的同时有效地减少了节点的密钥空间需求.
Abstract:
In views of the limitation of storage resources and bandwidth of wireless sensor networks, an efficient key management scheme for heterogeneous sensor networks is proposed. In the scheme, the identity of nodes can be authenticated using bilinear pairing cryptography over an elliptic curve, and the attacks of the illegal nodes can be resisted by verifying the legitimacy of the nodes. Theoretic studies and figures of simulation show that when there exists communication between the nodes, the nodes set-up share the secret keys, so the number of node’s keys is only 2 to 12 when the number of the nodes is 10 to 60, and the efficiency of keys can be authenticated, so a number of attacks including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the nodes storage cost.

参考文献/References:

[1] Lynch K M,Schwartz I B,Yang P,et al.Decentralized environmental modeling by mobile sensor networks[J].IEEE Transactions on Robotics,2008,24(3):710-724.
[2] Lee J C,Wong K H,Cao J,et al.Key management issues in wireless sensor networks:current proposals and future developments[J].IEEE Wireless Communication,2007,14(5):76-84.
[3] Liu D,Ning P,Du W.Group-based key predistribution for wireless sensor networks[J].ACM Trans Sensor Network,2008,4(2):1-30.
  
[4] Yu Z,Guan Y.A key management scheme using deployment knowledge for wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2008,19(10):1413-1420.
[5] Gura N,Patel A,Wander A,et al.Comparing elliptic curve cryptography and RSA on 8-bit CPUs[C]//Proc of the 6th International Workshop on Cryptographic Hardware and Embedded Systems.Boston,USA,2004:119-132.
[6] Oliveira L B,Aranha D F,Morals E,et a1.TinyTate:computing the tate pairing in resource-constrained sensor nodes[C]//Sixth IEEE International Symposium on Network Computing and Applications.Cambridge,MA,USA,2007:318-323.
[7] Doyle B,Bell S,Smeaton A F,et al.Security considerations and key negotiation techniques for power constrained sensor networks[J].The Computer Journal,2006,49(4):443-453.
[8] Boneh D,Franklin M.Identity-based encryption from weil pairing[EB/OL].(2008)[2010-06].http://eprint.iacr.org/.
[9] Zhou Y,Fang Y,Zhang Y.Securing wireless sensor networks:a survey[J].IEEE Communications Surveys and Tutorials,2008,10(3):6-28.
[10] Xu J,Zhang Z,Feng D.ID-based proxy signature using bilinear pairings [C]//Parallel and Distributed Processing and Applications-ISPA 2005 International Workshops,LNCS 3759.Nanjing,China,2005:359-367.
[11] Du X,Guizani M,Xiao Y,et al.Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1223-1229.

相似文献/References:

[1]胡静,沈连丰.基于博弈论的无线传感器网络分簇路由协议[J].东南大学学报(自然科学版),2010,40(3):441.[doi:10.3969/j.issn.1001-0505.2010.03.001]
 Hu Jing,Shen Lianfeng.Clustering routing protocol of wireless sensor networks based on game theory[J].Journal of Southeast University (Natural Science Edition),2010,40(1):441.[doi:10.3969/j.issn.1001-0505.2010.03.001]
[2]王霄峻,陈晓曙.无线传感器网络补偿性代价生成树路由算法[J].东南大学学报(自然科学版),2009,39(4):690.[doi:10.3969/j.issn.1001-0505.2009.04.008]
 Wang Xiaojun,Chen Xiaoshu.Compensatory cost spanning tree routing algorithm for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2009,39(1):690.[doi:10.3969/j.issn.1001-0505.2009.04.008]
[3]谢启辉,黄杰.基于动态搜索区域的无线传感器网络小世界特性构建方案[J].东南大学学报(自然科学版),2012,42(4):593.[doi:10.3969/j.issn.1001-0505.2012.04.003]
 Xie Qihui,Huang Jie.A scheme of constructing small world network in WSNs based on dynamically searching zone[J].Journal of Southeast University (Natural Science Edition),2012,42(1):593.[doi:10.3969/j.issn.1001-0505.2012.04.003]
[4]那成亮,周廷显,李立宏,等.用于多跳无线传感器网络的自适应退让算法[J].东南大学学报(自然科学版),2006,36(2):217.[doi:10.3969/j.issn.1001-0505.2006.02.008]
 Na Chengliang,Zhou Tingxian,Li Lihong,et al.Adaptive backoff algorithm for multihop wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2006,36(1):217.[doi:10.3969/j.issn.1001-0505.2006.02.008]
[5]刘林峰,吴家皋,邹志强,等.面向节点失效问题的无线传感器网络拓扑自愈算法[J].东南大学学报(自然科学版),2009,39(4):695.[doi:10.3969/j.issn.1001-0505.2009.04.009]
 Liu Linfeng,Wu Jiagao,Zou Zhiqiang,et al.Topology self-cure algorithm aiming at node failure problem in wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2009,39(1):695.[doi:10.3969/j.issn.1001-0505.2009.04.009]
[6]阴亚东,张利红,孟海涛,等.780/868/915MHz频段无线传感器网络低功耗电流复用频率综合器[J].东南大学学报(自然科学版),2011,41(6):1146.[doi:10.3969/j.issn.1001-0505.2011.06.005]
 Yin Yadong,Zhang Lihong,Meng Haitao,et al.780/868/915 MHz frequency bands low power current reusing frequency synthesizer for wireless sensor network[J].Journal of Southeast University (Natural Science Edition),2011,41(1):1146.[doi:10.3969/j.issn.1001-0505.2011.06.005]
[7]邓夏阳,黄杰.LEACH算法最优数据采集方案[J].东南大学学报(自然科学版),2012,42(1):20.[doi:10.3969/j.issn.1001-0505.2012.01.004]
 Deng Xiayang,Huang Jie.Optimal data acquisition scheme about LEACH[J].Journal of Southeast University (Natural Science Edition),2012,42(1):20.[doi:10.3969/j.issn.1001-0505.2012.01.004]
[8]王洋,袁慎芳,董晨华,等.一种无线传感器网络分布式连续数据采集系统的同步方法[J].东南大学学报(自然科学版),2011,41(1):25.[doi:10.3969/j.issn.1001-0505.2011.01.006]
 Wang Yang,Yuan Shenfang,Dong Chenhua,et al.Synchronous method of wireless sensor network for distributed continuous data acquisition system[J].Journal of Southeast University (Natural Science Edition),2011,41(1):25.[doi:10.3969/j.issn.1001-0505.2011.01.006]
[9]方晨,刘昊,时龙兴.一种基于自适应竞争窗口的无线传感器网络拥塞缓解策略[J].东南大学学报(自然科学版),2013,43(4):686.[doi:10.3969/j.issn.1001-0505.2013.04.003]
 Fang Chen,Liu Hao,Shi Longxing.Congestion alleviation strategy based on adaptive contention window for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2013,43(1):686.[doi:10.3969/j.issn.1001-0505.2013.04.003]
[10]蒋富龙,刘昊.一种无线传感器网络多信道动态路径转发协议[J].东南大学学报(自然科学版),2014,44(1):28.[doi:10.3969/j.issn.1001-0505.2014.01.006]
 Jiang Fulong,Liu Hao.Multichannel dynamic-path forwarding protocol for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2014,44(1):28.[doi:10.3969/j.issn.1001-0505.2014.01.006]
[11]张兴,何泾沙,韦潜.无线传感器网络中节点移动场景下的密钥管理方法[J].东南大学学报(自然科学版),2011,41(2):227.[doi:10.3969/j.issn.1001-0505.2011.02.003]
 Zhang Xing,He Jingsha,Wei Qian.Key managing for node mobility scenarios in wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2011,41(1):227.[doi:10.3969/j.issn.1001-0505.2011.02.003]

备注/Memo

备注/Memo:
作者简介:余旺科(1979—),男,博士生;马文平(联系人),男,博士,教授,博士生导师,wp_ma@mail.xidian.edu.cn.
基金项目:国家高技术研究发展计划(863计划)资助项目(2007AA01Z472)、国家自然科学基金资助项目(60773002,61072140)、高等学校创新引智计划资助项目(B08038).
引文格式: 余旺科,马文平,陈和风,等.一种有效的无线传感器网络密钥管理方案[J].东南大学学报:自然科学版,2011,41(1):20-24.[doi:10.3969/j.issn.1001-0505.2011.01.005]
更新日期/Last Update: 2011-01-20