计算机科学 ›› 2016, Vol. 43 ›› Issue (11): 215-220.doi: 10.11896/j.issn.1002-137X.2016.11.042

• 信息安全 • 上一篇    下一篇

基于簇的三维水声传感器网络的密钥管理方案

黄彬,刘广钟,徐明   

  1. 上海海事大学信息工程学院 上海201306,上海海事大学信息工程学院 上海201306,上海海事大学信息工程学院 上海201306
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61202370),上海市教委科研创新项目(14YZ110),中国博士后科学基金资助

Key Management Scheme for Three-dimensional Acoustic Sensor Network Based on Cluster

HUANG Bin, LIU Guang-zhong and XU Ming   

  • Online:2018-12-01 Published:2018-12-01

摘要: 在基于簇的三维水声传感器网络中,将布置区域划分为多个正方体的簇空间。在簇头节点间,提出通过相对坐标位置产生节点间的验证对称密钥;在簇内节点间,提出通过改进的对称多项式方法产生节点间的验证对称密钥。网络中的节点进行通信交流时都是采用基于对称矩阵的通信对称密钥,实现节点间的通信全连通。相比于传统的传感器网络密钥管理方案,本方案能够实现节点撤销和密钥更新,具有较高的可扩展性、可靠性和较低的开销。由于事先采用了轻量级节点认证机制,本方案能够很好地抵御节点间信息交流时的DoS攻击,特别是汇聚攻击。由于采用了三维密钥,本方案比单一的单向哈希链方法能更加有效地抵御簇头节点妥协。

关键词: 三维密钥,单向哈希链,对称矩阵,验证密钥,通信密钥

Abstract: In the three-dimensional acoustic sensor network based on cluster,the decorated area is divided into multiple rooms which are cubes.Among cluster head nodes,the symmetric key is generated to verify nodes by relative coordinates.Between nodes within the cluster,the symmetric key is generated to verify nodes by modified symmetric polynomials.When the nodes communicate in the network,they generate symmetric key which is used to communicate by symmetric matrices.It realizes complete connection in communication.Compared with the previous key management scheme for sensor network,this scheme can realize node revocation and key update,and it has high scalability,reliability and low cost.This scheme can also effectively resist DoS attack especially gather attack between nodes’ communication because of first lightweight node authentication mechanism.Compared with one-way hash method,this scheme can more efficiently resist cluster head compromise because of three-dimensional key.

Key words: Three-dimensional key,One-way hash chain,Symmetric matrix,Verification key,Communication key

[1] Heidemann J,Ye W,Wills J,et al.Research challenges and applications for underwater sensor networking[C]∥Proceedings of the Wireless Communication and Networking Conference.Las Vegas,NV,USA,2006,1:228-235
[2] Wei Zhi-qiang,Yang Guang,Cong Yan-ping.Underwater sensor network security research[J].Chinese Journal of Computer,2012,8(35):1594-1606(in Chinese) 魏志强,杨光,丛艳平.水下传感器网络安全研究[J].计算机学报,2012,8(35):1594-1606
[3] Su Zhong,Lin Chuang,Feng Fu-jun.Wireless sensor network key management scheme and protocol [J].Chinese Journal of Software,2007,5(18):1218-1231(in Chinese) 苏忠,林闯,封富君.无线传感器网络密钥管理的方案和协议 [J].软件学报,2007,5(18):1218-1231
[4] Xiao Y,Rayi V K,Sun B,et al.A survey of key managementschemes in wireless sensor networks [J].Computer Communications,2007,30(11/12):2314-2341
[5] Eschenauer L,Gligor V.A key management scheme for distributed sensor networks [C]∥Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002:41-47
[6] Blom R.An optimal class of symmetric key generation systems [C]∥Beth T,Cot N,Ingemarsson I,eds.Proc.of the EUROCRYPT’84.New York:Springer-Verlag,1984:335-338
[7] Blundo C,Santis A D,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences [J].Information and Computation,1998,6(1):1-23
[8] Su Zhong, Lin Chuang, Ren Feng-yuan.A preassigned hairschene in Wireless sensor network about the random key based on the hash chain[J].Chinese Journal of Computer,2009,32(1):30-41(in Chinese) 苏忠,林闯,任丰原.无线传感器网络中基于散列链的随机密钥预分发方案[J].计算机学报,2009,32(1):30-41
[9] Perrig A,Stankovic J,Wagner D.Security in wireless sensornetworks [J].Communications of the ACM,2004,7(6):53-57
[10] Bollobas B,Fflton W,Katok A,et al.Rand Graphs [M].Cambridge:Cambridge University Press,2001:160-200
[11] Chan H,Perri G A,Song D.Random key pre-distribution sch-emes for sensor networks[C]∥IEEE Symposium in Security and Privacy.Berkeley,California:IEEE Computer Society,2003:197-205

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!