无线传感器网络中基于区组设计的密钥预分配方案

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

:2008-12-11;:2009-03-12:(1970-),,,,,:;(1962-),,,,,:;(1937-),,,,,::1001-9081(2009)06-1622-031,1,2(1.,451191;2.,430074)(zjm1996@163.com):Blom,,,,,:;;:TP212.9;TN918.6:AKeypre2distributionschemebasedonblockdesignforwirelesssensornetworksZHANGJian2min1,LIJian1,LIUXian2de2(1.DepartmentofComputerScienceandEngineering,HenanInstituteofEngineering,ZhengzhouHenan451191,China;2.DepartmentofOptoelectronicsEngineering,HuazhongUniversityofScienceandTechnology,WuhanHubei430074,China)Abstract:Keymanagementisparamountforwirelesssensornetworks.AkeydistributingprotocolbasedonblockdesignandBlompsschemewasproposed.Withtheadvantageoftheblockdesign,thisschemecansubstantiallyimprovethenetworkpsconnectivity.Incontrasttootherkeypre2distributionschemes,thisonehashigherresiliencetonodecompromiseKeywords:WirelessSensorNetwork(WSN);keymanagement;blockdesign0,,,,,[1],,[2][1],q,q2composite,q2composite[1][3],,[4],,,,[5],(BalancedIncompleteBlockDesign,BIBD),,,,Blom,11.11X={x1,x2,,xv}v,B1,B2,,BbXbk():1)xX,B1,B2,,Bbr;2)X2B1,B2,,Bb;3)0,kv-1;B1,B2,,Bb,BBID2(b,v,r,k,),bk=vr,r(k-1)=(v-1)2(b,v,r,k,),b=v,BIBD(SBIBD),SBIBD2(b,k,),r=k,k(k-1)=(v-1)BIBD:k;k;;3(FiniteProjectivePlanes,FPP),n:n2+n+1;n2+n+1;n+1;29620096JournalofComputerApplicationsVol.29No.6June2009n+1n2,n,,nBIBD,SBIBD2(n2+n+1,n+1,1)1.2BlomBlomF(q)AGq,G(+1)NN,,:,A=(RG)T,R(+1)(+1)AGNN,kij=kjii,AiGiG,ij,G,kijkjiAGkij=kji,22.1BlomBIBD,BIBD,nBIBD2(n2+n+1,n+1,1),(KPS)BIBD11KPSBIBDKPSBIBDn2+n+1n2+n+1n+1n+11:,2.2n,n=qk,q,kBlom,(n2+n+1),BIBD,(n+1),(n+1)BIBD,,,t2.3,,Blom2.4,[4],33.1t,(+1),t(+1),m=t(+1),t,t(+1),:1)BIBD;2)[4]BIBD,+1,F(q)+13.2,N,Pc,d:d=(N-1)N[ln(N)-ln(-ln(Pc))](1)DPc,Plocal:Plocal=dD=1D(N-1)N[ln(N)-ln(-ln(Pc))](2),,Plocal0.33,3[2]P1,Pr1;P2,Pr2(n+1),P1=1n+1(3)P2=nn+1(4),t(n+1);,t,:Pr1=1-n+1tn+1-ttn+1tn+1t=1-((n+1-t)!)2(n+1)!(n+1-2t)!(5)32616:Pr2=nt-1nt-1n+1tn+1t=tn+12(6):Plocal=1n+11-((n+1)-t)!)2(n+1)!(n+1-2t)!+nn+1tn+12(7)1n,Plocalt,,n,n,,,,n+1,1,,,,BIBD,13.3L,K;xCx;Sii;BiKSi,SiKSiKSix,L:P(Lbroken|Cx)=P(B1B2Bn2+n+1|Cx)(8)LK,Bi(1in2+n+1),,:P(Lbroken|Cx)=(n2+n+1)P(B1|Cx)(9)P(B1|Cx)xS1,S1,:P(B1|Cx)=P((KS1)S1compromized|Cx)=P((KS1)S1compromizedCx)P(Cx)(10)KS1xS1,:P(B1|Cx)=P(KS1)P(S1compromizedCx)P(Cx)=P(KS1)P(S1compromized|Cx)(11)K,:P(KS1)=1n2+n+1(12),t,S1p=t/(n2+n+1),x,qxt(P1)q(1-P1)q[3],q:P(S1compromised|Cx)=xi=+1xitn2+n+1i1-tn2+n+1x-i(13)x,:P(Lbroken|Cx)=(n2+n+1)1n2+n+1P(S1compromized|Cx)=xi=+1xitn2+n+1i1-tn2+n+1x-i(14)2m=200n,t,,,,,n,t,,m=t(+1),t,n,t,n,,nt,2(m=200)3.43,[1]EG,[2]q2composite(q=2,3)[4](MultiKeySpaces,MKS)m=200,P=0.33,,EG0.59;q2composite(q=2)0.88,q2composite(q=3)MSK(1642)426129xi,Ai,Ai,Ai4)(mw,m,,K0,K1,,Ki,y0,y1,,yi),(mw,m,),(K0,K1,,Ki),(y0,y1,,yi),,,5)ixpiA0,A1,,Ai-1x0,x1,,xi-1k0,k1,,ki-1,6),,mw,,,,7),K03.31),,,2),,,3)x0,x1,,xi,,,4,,:[1]MAMBOM,USUDAK,OKAMOTOE.Proxysignaturesfordelega2tingsigningoperation[C]//Proceedingsof3rdACMConferenceonComputerandCommunicationSecurity.NewDelhi:ACMPress,1996:48-57.[2].[D].:,2000.[3],.[J].,2006,23(5):653-658.[4],.[J].,2004,40(9):152-154.[5]LEEB,KIMH,KIMK.Strongproxysignatureanditsapplication[C]//The2001SymposiumonCryptographyandInformationSecur2ity.Oiso:[s.n.],2001:603-608.[6],.[J].,2004,21(8):119-121.[7]SCHNORRCP.Efficientidentificationandsignaturesforsmartcards[C]//Crypto89:AdvancesinCryptology,LNCl435.Berlin:Springer2Verlag,1990:239-252.(1624),MSK600,80034Blom,,,,,:[1]ESCHENAUERL,GLIGORVD.Akeymanagementschemefordistributedsensornetworks[C]//Proceedingsofthe9thACMCon2ferenceonComputerandCommunicationSecurity.NewYork:ACMPress,2002:41-47.[2]CHANH,PERRIGA,SONGD.Randomkeypredistributionschemesforsensornetworks[C]//ProceedingsofIEEESymposiumonSecurityandPrivacy.Washington,DC:IEEEComputerSociety,2003:197-205.[3]BLOMR.Anoptimalclassofsymmetrickeygenerationsystems[C]//ProceedingsoftheEUROCRYPT84workshoponAdvancesinCryptology:TheoryandApplicationofCryptographicTechniques.NewYork:Springer2Verlag,1984:335-338.[4]DUW,DENGJ,HANYS,etal.Apairwisekeypre2distributionschemeforwirelesssensornetworks[J].ACMTransactionsonIn2formationandSystemSecurity,2005,8(2):228-258.[5]CAMTEPESA,YENERB.Combinatorialdesignofkeydistribu2tionmechanismsforwirelesssensornetworks[J].ACMTransactionsonNetworking,2007,15(2):346-358.246129

1 / 4
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功