计算机科学 ›› 2016, Vol. 43 ›› Issue (7): 153-156.doi: 10.11896/j.issn.1002-137X.2016.07.027

• 信息安全 • 上一篇    下一篇

一种非对等无线传感器网络环境中安全高效的混合密钥管理机制

王刚,孙良旭,曾子维,杨丹   

  1. 辽宁科技大学软件学院 鞍山114051,辽宁科技大学软件学院 鞍山114051,辽宁科技大学软件学院 鞍山114051,辽宁科技大学软件学院 鞍山114051
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61402213),辽宁科技大学校青年基金项目(2014QN19)资助

Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN

WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan   

  • Online:2018-12-01 Published:2018-12-01

摘要: 密钥管理是实现WSN安全的首要功能。针对非对等无线传感网络中现有密钥管理存在的安全隐患和开销大等问题,提出一种安全高效的密钥管理机制。该机制包括一个基于椭圆曲线密码的轻量级签密算法,该签密不仅计算和通信代价小,还具有较好的前向安全性。基于提出的签密算法设计了完整的簇密钥管理机制,用于保证簇内通信的安全性。该机制基于簇基密钥构建各簇中的对称簇密钥,能够有效解决因簇首被俘而导致簇中所有感知节点失效的问题。为了更好地适应网络的动态性和扩展性,当网络节点变化和移动时,该机制能够基于簇密钥更新链有效地对簇密钥进行更新和维护。同时,还设计了簇密钥安全管理模型,模型能够根据网络环境安全威胁的不同,自适应进行簇密钥的更新,从而进一步提高了簇密钥更新的效率和算法性能。安全分析和性能对比表明,提出的机制在安全性和开销方面均胜于已有的其他密钥管理机制。

关键词: 密钥管理,非对等WSN,椭圆曲线密码,签密,簇密钥

Abstract: Key management is crucially important for all security goals in WSNs.For solving the security vulnerabilities and heavy overhead problems of the existing key managements in heterogeneous WSN,a key management mechanism was put forward.The mechanism includes an ECC-based lightweight sigcryption algorithm which can not only cost less computation and communication,but also have better forward security.An entire cluster key management protocol is designed based on the above sigcryption that can ensure the communication security in the cluster and use cluster base key to generate the cluster key in each cluster.The employment of cluster base key can effectively avoid all SNs being invalid when CH is captured.To adapt the dynamic and scalability characteristic of WSN,the cluster key can be effectively refreshed and maintained by utilizing the cluster key refresh chain.In addition,a cluster key security management model was proposed which can self-adaptively refresh the cluster key according to the change of network environment thread and further improve the cluster key refreshment performance.The contrast results show that the presented mechanism is better than other existing mechanisms in terms of security and protocol performance.

Key words: Key management,Heterogeneous WSN,Elliptical curve cryptography,Signcryption,Cluster key

[1] Zeng Wei-ni,Lin Ya-ping,Yu Jian-ping,et al.Group Key Ma-nagement Based on Random Perturbation in Wireless Sensor Networks[J].Journal of Software,2013,24(4):873-886(in Chinese) 曾玮妮,林亚平,余建平,等.传感器网络中基于随机混淆的组密钥管理机制[J].软件学报,2013,24(4):873-886
[2] Guo Song-hui,Niu Xiao-peng,Wang Yu-long.Elliptic CurveBased Light-weight Authentication and Key Agreement Scheme [J].Computer Science,2015,42(1):137-141(in Chinese) 郭松辉,牛小鹏,王玉龙.一种基于椭圆曲线的轻量级身份认证及密钥协商方案[J].计算机科学,2015,42(1):137-141
[3] Wang Gang,Wen Tao,Guo Quan,et al.An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks [J].Journal of Computer Research and Development,2010,47(5):911-920(in Chinese) 王刚,温涛,郭权,等.移动自组网中安全高效的组密钥管理方案[J].计算机研究与发展,2010,47(5):911-920
[4] Lee J,Kapitanova K,Son S H.The price of security in wireless sensor networks [J].Computing Network Journal,Elsevier,2010,54(17):2967-2978
[5] Oliveira L B,Aranha D F,Gouvea C P L,et al.TinyPBC:Pai-rings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computing Communication Journal,Elsevier,2011,34(3):485-493
[6] Hagras E A,EI-Saied D,Aly H H.Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks [C]∥28th National Radio Science Conf(NRSC).2011
[7] Riaz R,Naureen A,Akram A,et al.A unified security frame-work with three key management schemes for wireless sensor networks[J].Computing Communication Journal,Elsevier,2008(31):4269-4280
[8] Du X,Guizani M,Xiao Y,et al.A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks [J].IEEE Transactions Wireless Communication,2009,8(3):1223-1229
[9] Mizanur R,Sk M,El-Khatib K.Private key agreement and secure communication for heterogeneous sensor networks [J].Parallel Distribution Computing,Elsevier,2010(70):858-870
[10] Khaliq-ur-Rahman Raazi S M,Lee H,Lee S,et al.MUQAMI+:A scalable and locally distributed key management scheme for clustered sensor networks [J].Annalso of Telecommunications,Springer,2010,65(1/2):101-116
[11] Stavrou E,Pitsillides A.A survey on secure multipath routing protocols in WSNs [J].Computing Network Journal, 2010(54):2215-2238
[12] Alagheband M R,Aref M R.Dynamic and secure key management model for hierarchical heterogeneous sensor networks [J].IET Information Security,2012,6(4):271-280
[13] Zhan Guo-xing,Shi Wei-song,Deng Ju-lia.Design and imple-mentation of TARFA trust-aware routing framework for WSNs [J].IEEE Transactions on Dependable and Secure Computing,2012,9(2):184-197

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!