[1]张兴,何泾沙,韦潜.无线传感器网络中节点移动场景下的密钥管理方法[J].东南大学学报(自然科学版),2011,41(2):227-232.[doi:10.3969/j.issn.1001-0505.2011.02.003]
 Zhang Xing,He Jingsha,Wei Qian.Key managing for node mobility scenarios in wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2011,41(2):227-232.[doi:10.3969/j.issn.1001-0505.2011.02.003]
点击复制

无线传感器网络中节点移动场景下的密钥管理方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
41
期数:
2011年第2期
页码:
227-232
栏目:
自动化
出版日期:
2011-03-20

文章信息/Info

Title:
Key managing for node mobility scenarios in wireless sensor networks
作者:
张兴12何泾沙3韦潜2
(1辽宁工业大学电子与信息工程学院, 锦州 121001)
(2北京工业大学计算机学院, 北京 100124)
(3北京工业大学软件学院, 北京 100124)
Author(s):
Zhang Xing12He Jingsha3Wei Qian2
(1School of Electronics and Informatics Engineering, Liaoning University of Technology, Jinzhou 121001, China)
(2College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China)
(3School of Software Engineering, Beijing University of Technology, Beijing 100124, China)
关键词:
无线传感器网络节点移动场景安全密钥管理椭圆曲线数字签名
Keywords:
wireless sensor networks node mobility scenarios security key management elliptic curve digital signature
分类号:
TP212.9
DOI:
10.3969/j.issn.1001-0505.2011.02.003
摘要:
为了探讨无线传感器网络中节点移动场景下的密钥管理方法,克服现有方案在移动节点重新加入网络方面的安全缺陷,提出了基于椭圆曲线数字签名算法的复合安全机制来验证移动场景下的节点身份,解决了其他密钥管理方案中存在的节点易受拒绝服务攻击和密钥易被敌人推算出等安全性问题.采用阶为160 bit的椭圆曲线,在带有XMTS300CB传感器板的IRIS传感器节点上实施了该密钥管理方案,通过与新邻居安全地建立对密钥和本地广播密钥,达到帮助移动场景下的节点安全地加入网络的目的.安全与性能分析表明,该方案能够有效抵御针对无线传感器网络的主要攻击手段,并且具有较低的计算、通信和存储负载.
Abstract:
In order to study deeply key management methods for node mobility scenarios in wireless sensor networks and overcome security shortcomings of current key management schemes that ignore the security of rejoining mobile nodes, composite security mechanisms based on the elliptic curve digital signature algorithm are proposed to help nodes in the mobility scenarios authenticate their identities. Meanwhile, this scheme can solve some security flaws in other key management schemes, such as nodes are susceptible to DoS(denial of service) attacks and keys are liable to be inferred. Using 160bit ECC(elliptic curve cryptosystems), this scheme has been implemented in Crossbow’s IRIS nodes with the XMTS300CB sensor boards, in which nodes in the mobility scenarios can join the network securely by establishing shared pair wise keys and local broadcast keys with new neighbors. Security and performance analysis show that this scheme can effectively prevent main attacks on wireless sensor networks. Furthermore, its computation, communication and storage overhead are low.

参考文献/References:

[1] Wang Y,Attebury G,Ramamurthy B.A survey of security issues in wireless sensor networks [J].IEEE Communications Surveys &Tutorials,2006,8(2):2-22.
[2] Zhou Y,Fang Y,Zhang Y.Securing wireless sensor networks:a survey [J].IEEE Communications Surveys &Tutorials,2008,10(3):6-28.
[3] Zhou Y,Zhang Y,Fang Y.Access control in wireless sensor networks [J].Ad Hoc Networks,2007,5(1):3-13.
[4] Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks [C]//Proceedings of 9th ACM Conference on Computer and Communications Security.New York,2002:41-47.
[5] Liu D,Ning P,Li R.Establishing pair wise keys in distributed sensor networks [J].ACM Transactions on Information and System Security,2005,8(1):41-77.
[6] Zhu S,Setia S,Jajodia S.LEAP+:efficient security mechanism for large-scale distributed sensor networks [J].ACM Transactions on Sensor Networks,2006,2(4):500-528.
[7] Deng J,Hartung C,Han R,et al.A practical study of transitory master key establishment for wireless sensor networks [C]//Proceedings of SecureComm. Piscataway,USA,2005:289-302.
[8] Perrig A,Szewczyk R,Tygar J D,et al.SPINS:security protocols for sensor networks [J].ACM Wireless Networks,2002,8(5):521-534.
[9] Zhang X,He J,Wei Q.An energy-efficient dynamic key management scheme in wireless sensor networks [C]//Proceedings of 10th International Symposium on Pervasive Systems,Algorithms and Networks.Piscataway,USA,2009:238-242.
[10] Vanstone S.Responses to NIST’s proposal [J].Communications of the ACM,1992,35(7):50-52.
[11] Goldreich O,Goldwasser S,Micali S.How to construct random functions [J].Journal of the ACM,1986,33(4):210-217.
[12] Diffie W,Hellman M E.New directions in cryptography [J].IEEE Transactions on Information Theory,1976,22(6):644-654.

相似文献/References:

[1]胡静,沈连丰.基于博弈论的无线传感器网络分簇路由协议[J].东南大学学报(自然科学版),2010,40(3):441.[doi:10.3969/j.issn.1001-0505.2010.03.001]
 Hu Jing,Shen Lianfeng.Clustering routing protocol of wireless sensor networks based on game theory[J].Journal of Southeast University (Natural Science Edition),2010,40(2):441.[doi:10.3969/j.issn.1001-0505.2010.03.001]
[2]王霄峻,陈晓曙.无线传感器网络补偿性代价生成树路由算法[J].东南大学学报(自然科学版),2009,39(4):690.[doi:10.3969/j.issn.1001-0505.2009.04.008]
 Wang Xiaojun,Chen Xiaoshu.Compensatory cost spanning tree routing algorithm for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2009,39(2):690.[doi:10.3969/j.issn.1001-0505.2009.04.008]
[3]谢启辉,黄杰.基于动态搜索区域的无线传感器网络小世界特性构建方案[J].东南大学学报(自然科学版),2012,42(4):593.[doi:10.3969/j.issn.1001-0505.2012.04.003]
 Xie Qihui,Huang Jie.A scheme of constructing small world network in WSNs based on dynamically searching zone[J].Journal of Southeast University (Natural Science Edition),2012,42(2):593.[doi:10.3969/j.issn.1001-0505.2012.04.003]
[4]那成亮,周廷显,李立宏,等.用于多跳无线传感器网络的自适应退让算法[J].东南大学学报(自然科学版),2006,36(2):217.[doi:10.3969/j.issn.1001-0505.2006.02.008]
 Na Chengliang,Zhou Tingxian,Li Lihong,et al.Adaptive backoff algorithm for multihop wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2006,36(2):217.[doi:10.3969/j.issn.1001-0505.2006.02.008]
[5]刘林峰,吴家皋,邹志强,等.面向节点失效问题的无线传感器网络拓扑自愈算法[J].东南大学学报(自然科学版),2009,39(4):695.[doi:10.3969/j.issn.1001-0505.2009.04.009]
 Liu Linfeng,Wu Jiagao,Zou Zhiqiang,et al.Topology self-cure algorithm aiming at node failure problem in wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2009,39(2):695.[doi:10.3969/j.issn.1001-0505.2009.04.009]
[6]阴亚东,张利红,孟海涛,等.780/868/915MHz频段无线传感器网络低功耗电流复用频率综合器[J].东南大学学报(自然科学版),2011,41(6):1146.[doi:10.3969/j.issn.1001-0505.2011.06.005]
 Yin Yadong,Zhang Lihong,Meng Haitao,et al.780/868/915 MHz frequency bands low power current reusing frequency synthesizer for wireless sensor network[J].Journal of Southeast University (Natural Science Edition),2011,41(2):1146.[doi:10.3969/j.issn.1001-0505.2011.06.005]
[7]邓夏阳,黄杰.LEACH算法最优数据采集方案[J].东南大学学报(自然科学版),2012,42(1):20.[doi:10.3969/j.issn.1001-0505.2012.01.004]
 Deng Xiayang,Huang Jie.Optimal data acquisition scheme about LEACH[J].Journal of Southeast University (Natural Science Edition),2012,42(2):20.[doi:10.3969/j.issn.1001-0505.2012.01.004]
[8]余旺科,马文平,陈和风,等.一种有效的无线传感器网络密钥管理方案[J].东南大学学报(自然科学版),2011,41(1):20.[doi:10.3969/j.issn.1001-0505.2011.01.005]
 Yu Wangke,Ma Wenping,Chen Hefeng,et al.Efficient key management scheme for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2011,41(2):20.[doi:10.3969/j.issn.1001-0505.2011.01.005]
[9]王洋,袁慎芳,董晨华,等.一种无线传感器网络分布式连续数据采集系统的同步方法[J].东南大学学报(自然科学版),2011,41(1):25.[doi:10.3969/j.issn.1001-0505.2011.01.006]
 Wang Yang,Yuan Shenfang,Dong Chenhua,et al.Synchronous method of wireless sensor network for distributed continuous data acquisition system[J].Journal of Southeast University (Natural Science Edition),2011,41(2):25.[doi:10.3969/j.issn.1001-0505.2011.01.006]
[10]方晨,刘昊,时龙兴.一种基于自适应竞争窗口的无线传感器网络拥塞缓解策略[J].东南大学学报(自然科学版),2013,43(4):686.[doi:10.3969/j.issn.1001-0505.2013.04.003]
 Fang Chen,Liu Hao,Shi Longxing.Congestion alleviation strategy based on adaptive contention window for wireless sensor networks[J].Journal of Southeast University (Natural Science Edition),2013,43(2):686.[doi:10.3969/j.issn.1001-0505.2013.04.003]

备注/Memo

备注/Memo:
作者简介:张兴(1975—),男,博士生;何泾沙(联系人),男,博士,教授,博士生导师,jhe@bjut.edu.cn.
基金项目:北京市教育委员会科技发展基金资助项目(KM201010005027).
引文格式: 张兴,何泾沙,韦潜.无线传感器网络中节点移动场景下的密钥管理方法[J].东南大学学报:自然科学版,2011,41(2):227-232.[doi:10.3969/j.issn.1001-0505.2011.02.003]
更新日期/Last Update: 2011-03-20