Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 395-398.

Previous Articles     Next Articles

Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes

CHEN Hao and HUANG Hai-ping   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper presented a key management scheme based on trust mechanism.Through evaluating the trust va-lue of the originating node,it determines whether the node can be the head node of a cluster for key updating.This scenario with a two-way trust packet forwarding mechanism,can not only get the trust value of the node,but also verify the correctness of the trust packet.It further improves the security of the key management implementation process.Meanwhile,this paper did theoretical research and analysis from the aspect of security,communication complexity and memory consumption,and experimental simulation.

Key words: Trust mechanism,Key management,Wireless sensor networks

[1] Eschenauer L,Gligor V D.A Key-management Scheme for Distributed Sensor Networks [C]∥Proc.of the 9th ACM Conference on Computer and Communications Security.[S.l.].ACM Press,2002:41-47
[2] Wenliang Du,Jing Deng,Yunghsiang S.Han,Pramod K.Varshney.A pair-wise key pre-distribution scheme for wireless sensor networks [C]∥The 10th ACM Conference on Computer and Communication Security(CCS’03).Washington DC,USA,ACM Press,Oct.2003:12-21
[3] Liu D,Ning P.Location-based pair-wise key establishments for static sensor networks [C]∥Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks.Fairfax,Virginia,USA,ACM Press,2003:72-82
[4] Eschenauer L,Gligor V D.A key-management scheme for dis-tributed sensor networks [C]∥The 9th ACM Conference on Computer and Communication Security(CCS’02).Washington DC,USA,ACM Press,Nov.2002:41-47
[5] Blundo C,Santis A D,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences [J].Information and Computation,1998,146(1):1-23
[6] Wen Mi,Zheng Yan-fei,Ye Wen-jun,et al.A key management protocol with robust continuity for sensor networks [J].Computer Standards & Interfaces,2012,31(4):642-647
[7] Cheng Y,Agrawal D P.An improved Key Disstribution mechanism for Large-Scale Hierarchical Wire-less Sensor Networks [J].Ad hoc Networks,2007:35-48
[8] Cheng Y,Angrawal D P.Efficient pairwise key Es-tablishmentand manangement in StaticWireless Sensor Network [C]∥Proceedings of Moblile Ad-hoc and Sensor Systems Conference.2005
[9] 成奋华.传感器网络中基于信誉模型的对偶密钥建立算法 [J].计算机应用,2011,7(31):1876-1879
[10] 程伟,程良伦.基于信任的无线传感器网络动态密钥管理方案 [J].计算机测量与控制,2011,19(9):2315-2318
[11] 程芳权,彭智勇.可信云存储环境下支持访问控制的密钥管理[J].计算机研究与发展,2013,50(8):1612-1627

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .