Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 277-281.

Previous Articles     Next Articles

Efficient Key Management Scheme for Data-centric Storage Wireless Sensor Networks

PAN Zhong-qiang and CHANG Xin-feng   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Based on the Exclusion Basis Systems(EBS),we proposed an efficient distributed key management scheme,termed as ERP-DCS,to improve the deficiencies identified in the pDCS scheme.ERP-DCS attempts to distribute the key management tasks,including key distribution,rekeying,and key revocation,to each cluster(i.e.grid cell) to reduce the number of rekeying messages.The results show that,comparing to the pDCS scheme,the ERP-DCS is superior,in terms of update messages needed in the rekeying process,at a little cost in key storage.

Key words: Key management,Data-centric storage sensor network,Information security,Exclusion basis system,Distributed system architecture

[1] 黄梅根,常新峰.一种基于蒙特卡罗法的无线传感器网络移动节点定位算法研究[J].传感技术学报,2010,3(5):562-566
[2] Ratnasamy S,Karp B,Yin L,et al.GHT:a Geographic Hash Table for Data-Centric Storage[C]∥Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications.2002:78-87
[3] Ghose A,Grossklags J,Chuang J.Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks Mobile Data Management[C]∥Lecture Notes in Computer Science.2003:45-62
[4] Newsome J,Shi E,Song D,et al.The Sybil Attack in Sensor Networks:Analysis &Defenses[C]∥Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks.2004:259-268
[5] Parno B,Perrig A,Gligor V.Distributed Detection of Node Replication Attacks in Sensor Networks[J].IEEE Symposium on Security and Privacy.2005:49-63
[6] Peng T,Leckie C,Ramamohanarao K.Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems[J].ACM Comput.Surv.,2007,39(1)
[7] Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654
[8] Min S,Sencun Z,Wensheng Z,et al.pDCS:Security and Privacy Support for Data-Centric Sensor Networks[J].IEEE Transactions on Mobile Computing,2009,8(8):1023-1038
[9] Eltoweissy M,Heydari M H,Morales L,et al.CombinatorialOptimization of Group Key Management[J].Journal of Network and Systems Management,2004,12(1):33-50
[10] Younis M F,Ghumman K,Eltoweissy M.Location-Aware Combinatorial Key Management Schemefor Clustered Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2006,17(8):865-882
[11] Alzaid H,Foo E.A taxonomy of secure data aggregation inwireless sensor networks[J].International Journal of Communication Networks and Distributed Syetems,2012,8(1):101-148
[12] 程芳权,彭智勇.可信云存储环境下支持访问控制的密钥管理[J].计算机研究与发展,2013,0(8):1613-1627

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!