计算机科学 ›› 2015, Vol. 42 ›› Issue (Z6): 395-398.

• 信息安全 • 上一篇    下一篇

基于节点间信任评估算法的无线传感器网络密钥管理方案

陈昊,黄海平   

  1. 南通大学附属医院信息科 南通226001;南京邮电大学计算机学院 南京210003,南京邮电大学计算机学院 南京210003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61373018)资助

Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes

CHEN Hao and HUANG Hai-ping   

  • Online:2018-11-14 Published:2018-11-14

摘要: 提出了一种基于信任机制的密钥管理方案,通过评测发起节点的信任值,判断节点是否可以作为密钥更新的簇头节点。方案中采用了双向信任数据包转发机制,不仅可以获取节点的信任值,同时也验证信任数据包的正确性,进一步提高了密钥管理实施过程中的安全性。同时对所阐述的方案,从安全性、通信复杂度和存储消耗等方面进行了理论研究和分析,并进行了实验仿真,具有较高的安全性。

Abstract: This paper presented a key management scheme based on trust mechanism.Through evaluating the trust va-lue of the originating node,it determines whether the node can be the head node of a cluster for key updating.This scenario with a two-way trust packet forwarding mechanism,can not only get the trust value of the node,but also verify the correctness of the trust packet.It further improves the security of the key management implementation process.Meanwhile,this paper did theoretical research and analysis from the aspect of security,communication complexity and memory consumption,and experimental simulation.

Key words: Trust mechanism,Key management,Wireless sensor networks

[1] Eschenauer L,Gligor V D.A Key-management Scheme for Distributed Sensor Networks [C]∥Proc.of the 9th ACM Conference on Computer and Communications Security.[S.l.].ACM Press,2002:41-47
[2] Wenliang Du,Jing Deng,Yunghsiang S.Han,Pramod K.Varshney.A pair-wise key pre-distribution scheme for wireless sensor networks [C]∥The 10th ACM Conference on Computer and Communication Security(CCS’03).Washington DC,USA,ACM Press,Oct.2003:12-21
[3] Liu D,Ning P.Location-based pair-wise key establishments for static sensor networks [C]∥Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks.Fairfax,Virginia,USA,ACM Press,2003:72-82
[4] Eschenauer L,Gligor V D.A key-management scheme for dis-tributed sensor networks [C]∥The 9th ACM Conference on Computer and Communication Security(CCS’02).Washington DC,USA,ACM Press,Nov.2002:41-47
[5] Blundo C,Santis A D,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences [J].Information and Computation,1998,146(1):1-23
[6] Wen Mi,Zheng Yan-fei,Ye Wen-jun,et al.A key management protocol with robust continuity for sensor networks [J].Computer Standards & Interfaces,2012,31(4):642-647
[7] Cheng Y,Agrawal D P.An improved Key Disstribution mechanism for Large-Scale Hierarchical Wire-less Sensor Networks [J].Ad hoc Networks,2007:35-48
[8] Cheng Y,Angrawal D P.Efficient pairwise key Es-tablishmentand manangement in StaticWireless Sensor Network [C]∥Proceedings of Moblile Ad-hoc and Sensor Systems Conference.2005
[9] 成奋华.传感器网络中基于信誉模型的对偶密钥建立算法 [J].计算机应用,2011,7(31):1876-1879
[10] 程伟,程良伦.基于信任的无线传感器网络动态密钥管理方案 [J].计算机测量与控制,2011,19(9):2315-2318
[11] 程芳权,彭智勇.可信云存储环境下支持访问控制的密钥管理[J].计算机研究与发展,2013,50(8):1612-1627

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .