无线传感器网络密钥管理方案综述[1]

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.:10072130X(2008)12200272053ASurveyontheKeyManagementSchemesforWirelessSensorNetworks,,,LIMin,YINJian2ping,WUYong2an,CHENGJie2ren(,410073)(SchoolofComputerScience,NationalUniversityofDefenseTechnology,Changsha410073,China):,,,,Abstract:ThekeymanagementschemehasbecomeahotspotofresearchonWSN.BasedonthecharacteristicsofWSN,therequirementsandevaluationmetricsofthekeymanagementschemesareanalyzed,andthentheclassickeyman2agementschemesareintroducedandcompared.Finally,somefuturedirectionsofresearcharepointedout.:;Keywords:wirelesssensornetwork;keymanagement:TP393.08:A1(WirelessSensorNetwork,WSN),WSN,WSN,,,(DOSSybilSinkholeWormhole),WSN,,,WSN2[13]:(1),(2),,,,(3):;,,,:(1):WSN,(2):,WSN,(3):WSN,,,,723:2008204213;:2008206225:(60603062);(06JJ3035):(19762),,,,,;,,,,;,,;,,,:410073;Tel:(0731)4573659,13397619986;E2mail:kdlimin@sina.comAddress:DoctoralBrigade,SchoolofComputerScience,NationalUniversityofDefenseTechnology,Changsha,Hunan410073,P.R.China©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.(4):WSN,,,,,WSN,WSN3,,,,,(1):,(2):,(3):,,(4):(5):,4,,,;,;,,[4]:(1)(Trusted2ServerScheme):,Kerberos;(2)(Self2EnforcingScheme):,Diffie2HellmanRSA;(3)(Pre2DistributionScheme):,(1)(2),WSN,WSN[68,1115](3),4.1PerrigSPINS[5]SPINS:SNEP(SecureNetworkEncryptionProtocol,SNEP)TELSA(TimedEffi2cientLoss2tolerantStreamAuthentication,TELSA);SNEP(Sink),Sink,AB,AB,BSink,SinkABABAB:AB:NA,A;BS:NA,NB,A,B,MAC(KBS,NA|NB|A|B);SA:{SKAB}KAS,MAC(KAS,NA|B|{SKAB}KAS);SB:{SKAB}KBS,MAC(KBS,NB|B|{SKAB}KBS),NAA,;KASKBSABsink;MAC(K,s)skMAC(MessageAuthentica2tionCode,MAC);{M}KKM;SKABAB,Sink,;:,,;,CHENG[6]BROSK,,Griffin[7]Striki[8],,4.2RSA(RivestShamirAdlemanalgo2rithm,RSA)ECC(EllipticCurveCryptography,ECC),ECC,,RSA,,224ECC2048RSA[9],MICA2mote87.3828MHzATmega128L,SRAM4KB,ROM128KB,WSN,,[10],MIC2mote768Diffie2Hellman31[11]1024,54.9MIC2Amote2AA,2V82©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.[11],,[1115]WSNDu[12]ECC,Huang[14]ECC,,,WSN,FFD(Full2FunctionalDevices,FFD)RFD(Reduced2FunctionalDevices,RFD),ECCFFD,RFDKotzanikolaou[15],4.3,:(1):;(2):,1;(3):4.3.1[1619]EschenauerGilgor[16]:(1)P,k(knP),(2),,,(Pair2WiseKey)(3),,(Path2Key),G(n,p),n,p,Pc,Pc=limnPr[G(n,p)isconnected]=ee-cp=ln(n)n+cn,c,nPc,p;Sink,,,;,;E&G,,E&G,q2Composite[17][17][17],[18]4.3.2[2026],:TinyOSTinySec[20],,,,,Bocheng[21],,n,n-1,;,,,,Blom[22]N,,GF(q)(q)(+1)NG(G+1)(+1)(+1)DA=(DG)T(ADG)D,:AG=(DG)TG=GTDTG=GTDG=(AG)TAGK=AG,Kij=KjiBlomKij(Kji)ijk(k=1,,N),AkGkij,G,A,1(Gs)1BlomBlom(+1),s,2secure,,,,,G,Bludo[23],F(q)(q)2t,92©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.(x,y)=ti,j=0aijxiyjf(x,y)=f(y,x)ID,i,f(i,y)ij,ID,ijf(i,j)=f(i,y=j),jif(j,i)=f(j,x=i)f(i,j)=f(j,i),ijBludo(t+1)logqBlom,t,t,t,t,Zhu[26],,LEAP(LocalizedEncryp2tionandAuthenticationProtocol,LEAP),LEAP;,,,,,,Liu[24]GBKP(Grid2BasedKeyPredistribution,GBKP),Chan[25]PIKE(PeerIntermediariesforKeyEstablishment,PIKE),,,4.3.3[2732],,,(1),[27]EBS[2932]Campete[27](CombinatorialDesignTheory)WSNBIBD(Bal2ancedIncompleteBlockDesign,BIBD)HybridBIBD[28],(v,b,r,k,):X={x1,x2,,xv},v,b,X{B1,B2,,Bb},k:Xbr;Xb;kvBIBD(v,b,r,k,)b=v,k=r,BIBD,(v,k,)N,q(FiniteProjectiveTheory)(q2+q+1,q+1,1)BIBD,qq2+q+1Nq2+q+1,q2+q+1,q+1,,q+1,1GQ(General2izedQuadrangles)(s,t)(t+1)(st+1),(t+1)(st+1),s+1,(t-1);,(s+1)GQt(s+1)/[(t+1)(st+1)],,,EBS(ExclusionBasisSystem,EBS)Eltoweissy[29],EBS(n,k,m),n,k,m()t[1,n],:(1)tk(),k;(2)m(),A1,A2,,Am,mi=1Ai=[1,n]-{t},mttEBSk+mk,EBS(23,11,12)2311=135207810623,11,();(),,Moharrum[30]EBSBlundo,EBSID,EBS,,,,,Younis[31]SHELL(Scalable,Hierarchial,Efficient,Location2Aware,andLight2Weight,SHELL),,EBS(),,EltoweissyLOCK(LocalizedCombinatorialKeying,LOCK)[32]4.3.4[3640],,Du[33]BlomE&G,,,03©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.[34]BludoE&G,Alan[35]BlomE&G,E&G,Blom,E&G,,WSN,Blom2secure,;Blom,,WSN,Anjum[36],,,,,;,Miller[37]5:(1)WSN,,,,,(2)(),,(3)WSN,;[5],:[1],,.[J].,2003,14(7):128221290.[2],,,.[J].,2008,18(5):121821231.[3]WuYongan,LiMin,CaiZhiping,etal.ADistributedAlgo2rithmtoApproximateNode2WeightedMinimum2Connected(,k)2CoverageinDenseSensorNetworks[C]ProcoftheIntlFrontiersofAlgorithmicsWorkshop,2008.[4]DuWenliang,DengJiang.AKeyManagementSchemeforWirelessSensorNetworksUsingDeploymentKnowledge[C]ProcofINFOCOM04,2004.[5]PerrigA,SzewczykR,WenV,etal.SPINS:SecurityProto2colsforSensorNetworks[C]Procofthe7thAnnualACMIntlConfonMobileComputingandNetworks,2001.[6]CHENGB,SUNGHAD.ReduceRadioEnergyConsumptionofKeyManagementProtocolforWirelessSensorNetworks[C]ProcofISLPED04,2004.[7]GriffinSP,DeCleeneBT,DondetiLR,etal.HierarchicalKeyManagementforMobileMulticastMembers[R].Techni2calReport,NorthropGrummanInformationTechnology,2002.[8]StrikiM,BarasJS.KeyDistributionProtocolsforMulticastGroupCommunicatio

1 / 6
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功