计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 277-281.

• 信息安全 • 上一篇    下一篇

数据储存式无线传感器网络下一个具有高效能的密钥管理方案

潘中强,常新峰   

  1. 平顶山学院网络计算中心 平顶山467000;平顶山学院网络计算中心 平顶山467000
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受河南省科技厅:无线传感器网络密钥管理方案研究(12B520043)资助

Efficient Key Management Scheme for Data-centric Storage Wireless Sensor Networks

PAN Zhong-qiang and CHANG Xin-feng   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对无线传感器网络能量、存储空间、通信开销等局限性问题,基于pDCS(Security and Privacy Support for Data-Centric Sensor Networks),在保证不失其安全性的前提下,以互斥基底系统(Exclusion Basis System,EBS)建构一个具有更高效率的分布式密钥管理方案,将其命名为ERP-DCS。该方案将网络密钥的管理工作(包括密钥分配、重置及撤销)分散至各个簇集中,藉以降低密钥重置阶段所需的通信量,节省能源,进而延长网络寿命。论证分析表明,与pDCS相比,ERP-DCS仅增加了些微的储存成本,却能大幅地降低密钥重置时的更新通信量。

关键词: 密钥管理,数据储存式无线传感器网络,信息安全,互斥基底系统,分散式系统架构

Abstract: Based on the Exclusion Basis Systems(EBS),we proposed an efficient distributed key management scheme,termed as ERP-DCS,to improve the deficiencies identified in the pDCS scheme.ERP-DCS attempts to distribute the key management tasks,including key distribution,rekeying,and key revocation,to each cluster(i.e.grid cell) to reduce the number of rekeying messages.The results show that,comparing to the pDCS scheme,the ERP-DCS is superior,in terms of update messages needed in the rekeying process,at a little cost in key storage.

Key words: Key management,Data-centric storage sensor network,Information security,Exclusion basis system,Distributed system architecture

[1] 黄梅根,常新峰.一种基于蒙特卡罗法的无线传感器网络移动节点定位算法研究[J].传感技术学报,2010,3(5):562-566
[2] Ratnasamy S,Karp B,Yin L,et al.GHT:a Geographic Hash Table for Data-Centric Storage[C]∥Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications.2002:78-87
[3] Ghose A,Grossklags J,Chuang J.Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks Mobile Data Management[C]∥Lecture Notes in Computer Science.2003:45-62
[4] Newsome J,Shi E,Song D,et al.The Sybil Attack in Sensor Networks:Analysis &Defenses[C]∥Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks.2004:259-268
[5] Parno B,Perrig A,Gligor V.Distributed Detection of Node Replication Attacks in Sensor Networks[J].IEEE Symposium on Security and Privacy.2005:49-63
[6] Peng T,Leckie C,Ramamohanarao K.Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems[J].ACM Comput.Surv.,2007,39(1)
[7] Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654
[8] Min S,Sencun Z,Wensheng Z,et al.pDCS:Security and Privacy Support for Data-Centric Sensor Networks[J].IEEE Transactions on Mobile Computing,2009,8(8):1023-1038
[9] Eltoweissy M,Heydari M H,Morales L,et al.CombinatorialOptimization of Group Key Management[J].Journal of Network and Systems Management,2004,12(1):33-50
[10] Younis M F,Ghumman K,Eltoweissy M.Location-Aware Combinatorial Key Management Schemefor Clustered Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2006,17(8):865-882
[11] Alzaid H,Foo E.A taxonomy of secure data aggregation inwireless sensor networks[J].International Journal of Communication Networks and Distributed Syetems,2012,8(1):101-148
[12] 程芳权,彭智勇.可信云存储环境下支持访问控制的密钥管理[J].计算机研究与发展,2013,0(8):1613-1627

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!