计算机科学 ›› 2016, Vol. 43 ›› Issue (7): 153-156.doi: 10.11896/j.issn.1002-137X.2016.07.027
王刚,孙良旭,曾子维,杨丹
WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan
摘要: 密钥管理是实现WSN安全的首要功能。针对非对等无线传感网络中现有密钥管理存在的安全隐患和开销大等问题,提出一种安全高效的密钥管理机制。该机制包括一个基于椭圆曲线密码的轻量级签密算法,该签密不仅计算和通信代价小,还具有较好的前向安全性。基于提出的签密算法设计了完整的簇密钥管理机制,用于保证簇内通信的安全性。该机制基于簇基密钥构建各簇中的对称簇密钥,能够有效解决因簇首被俘而导致簇中所有感知节点失效的问题。为了更好地适应网络的动态性和扩展性,当网络节点变化和移动时,该机制能够基于簇密钥更新链有效地对簇密钥进行更新和维护。同时,还设计了簇密钥安全管理模型,模型能够根据网络环境安全威胁的不同,自适应进行簇密钥的更新,从而进一步提高了簇密钥更新的效率和算法性能。安全分析和性能对比表明,提出的机制在安全性和开销方面均胜于已有的其他密钥管理机制。
[1] Zeng Wei-ni,Lin Ya-ping,Yu Jian-ping,et al.Group Key Ma-nagement Based on Random Perturbation in Wireless Sensor Networks[J].Journal of Software,2013,24(4):873-886(in Chinese) 曾玮妮,林亚平,余建平,等.传感器网络中基于随机混淆的组密钥管理机制[J].软件学报,2013,24(4):873-886 [2] Guo Song-hui,Niu Xiao-peng,Wang Yu-long.Elliptic CurveBased Light-weight Authentication and Key Agreement Scheme [J].Computer Science,2015,42(1):137-141(in Chinese) 郭松辉,牛小鹏,王玉龙.一种基于椭圆曲线的轻量级身份认证及密钥协商方案[J].计算机科学,2015,42(1):137-141 [3] Wang Gang,Wen Tao,Guo Quan,et al.An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks [J].Journal of Computer Research and Development,2010,47(5):911-920(in Chinese) 王刚,温涛,郭权,等.移动自组网中安全高效的组密钥管理方案[J].计算机研究与发展,2010,47(5):911-920 [4] Lee J,Kapitanova K,Son S H.The price of security in wireless sensor networks [J].Computing Network Journal,Elsevier,2010,54(17):2967-2978 [5] Oliveira L B,Aranha D F,Gouvea C P L,et al.TinyPBC:Pai-rings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computing Communication Journal,Elsevier,2011,34(3):485-493 [6] Hagras E A,EI-Saied D,Aly H H.Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks [C]∥28th National Radio Science Conf(NRSC).2011 [7] Riaz R,Naureen A,Akram A,et al.A unified security frame-work with three key management schemes for wireless sensor networks[J].Computing Communication Journal,Elsevier,2008(31):4269-4280 [8] Du X,Guizani M,Xiao Y,et al.A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks [J].IEEE Transactions Wireless Communication,2009,8(3):1223-1229 [9] Mizanur R,Sk M,El-Khatib K.Private key agreement and secure communication for heterogeneous sensor networks [J].Parallel Distribution Computing,Elsevier,2010(70):858-870 [10] Khaliq-ur-Rahman Raazi S M,Lee H,Lee S,et al.MUQAMI+:A scalable and locally distributed key management scheme for clustered sensor networks [J].Annalso of Telecommunications,Springer,2010,65(1/2):101-116 [11] Stavrou E,Pitsillides A.A survey on secure multipath routing protocols in WSNs [J].Computing Network Journal, 2010(54):2215-2238 [12] Alagheband M R,Aref M R.Dynamic and secure key management model for hierarchical heterogeneous sensor networks [J].IET Information Security,2012,6(4):271-280 [13] Zhan Guo-xing,Shi Wei-song,Deng Ju-lia.Design and imple-mentation of TARFA trust-aware routing framework for WSNs [J].IEEE Transactions on Dependable and Secure Computing,2012,9(2):184-197 |
No related articles found! |
|