计算机科学 ›› 2016, Vol. 43 ›› Issue (11): 215-220.doi: 10.11896/j.issn.1002-137X.2016.11.042
黄彬,刘广钟,徐明
HUANG Bin, LIU Guang-zhong and XU Ming
摘要: 在基于簇的三维水声传感器网络中,将布置区域划分为多个正方体的簇空间。在簇头节点间,提出通过相对坐标位置产生节点间的验证对称密钥;在簇内节点间,提出通过改进的对称多项式方法产生节点间的验证对称密钥。网络中的节点进行通信交流时都是采用基于对称矩阵的通信对称密钥,实现节点间的通信全连通。相比于传统的传感器网络密钥管理方案,本方案能够实现节点撤销和密钥更新,具有较高的可扩展性、可靠性和较低的开销。由于事先采用了轻量级节点认证机制,本方案能够很好地抵御节点间信息交流时的DoS攻击,特别是汇聚攻击。由于采用了三维密钥,本方案比单一的单向哈希链方法能更加有效地抵御簇头节点妥协。
[1] Heidemann J,Ye W,Wills J,et al.Research challenges and applications for underwater sensor networking[C]∥Proceedings of the Wireless Communication and Networking Conference.Las Vegas,NV,USA,2006,1:228-235 [2] Wei Zhi-qiang,Yang Guang,Cong Yan-ping.Underwater sensor network security research[J].Chinese Journal of Computer,2012,8(35):1594-1606(in Chinese) 魏志强,杨光,丛艳平.水下传感器网络安全研究[J].计算机学报,2012,8(35):1594-1606 [3] Su Zhong,Lin Chuang,Feng Fu-jun.Wireless sensor network key management scheme and protocol [J].Chinese Journal of Software,2007,5(18):1218-1231(in Chinese) 苏忠,林闯,封富君.无线传感器网络密钥管理的方案和协议 [J].软件学报,2007,5(18):1218-1231 [4] Xiao Y,Rayi V K,Sun B,et al.A survey of key managementschemes in wireless sensor networks [J].Computer Communications,2007,30(11/12):2314-2341 [5] Eschenauer L,Gligor V.A key management scheme for distributed sensor networks [C]∥Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002:41-47 [6] Blom R.An optimal class of symmetric key generation systems [C]∥Beth T,Cot N,Ingemarsson I,eds.Proc.of the EUROCRYPT’84.New York:Springer-Verlag,1984:335-338 [7] Blundo C,Santis A D,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences [J].Information and Computation,1998,6(1):1-23 [8] Su Zhong, Lin Chuang, Ren Feng-yuan.A preassigned hairschene in Wireless sensor network about the random key based on the hash chain[J].Chinese Journal of Computer,2009,32(1):30-41(in Chinese) 苏忠,林闯,任丰原.无线传感器网络中基于散列链的随机密钥预分发方案[J].计算机学报,2009,32(1):30-41 [9] Perrig A,Stankovic J,Wagner D.Security in wireless sensornetworks [J].Communications of the ACM,2004,7(6):53-57 [10] Bollobas B,Fflton W,Katok A,et al.Rand Graphs [M].Cambridge:Cambridge University Press,2001:160-200 [11] Chan H,Perri G A,Song D.Random key pre-distribution sch-emes for sensor networks[C]∥IEEE Symposium in Security and Privacy.Berkeley,California:IEEE Computer Society,2003:197-205 |
No related articles found! |
|