![無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議_第1頁(yè)](http://file3.renrendoc.com/fileroot_temp3/2022-2/1/40dcb2c6-de57-4832-9ea0-3a5fd52a5116/40dcb2c6-de57-4832-9ea0-3a5fd52a51161.gif)
![無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議_第2頁(yè)](http://file3.renrendoc.com/fileroot_temp3/2022-2/1/40dcb2c6-de57-4832-9ea0-3a5fd52a5116/40dcb2c6-de57-4832-9ea0-3a5fd52a51162.gif)
![無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議_第3頁(yè)](http://file3.renrendoc.com/fileroot_temp3/2022-2/1/40dcb2c6-de57-4832-9ea0-3a5fd52a5116/40dcb2c6-de57-4832-9ea0-3a5fd52a51163.gif)
![無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議_第4頁(yè)](http://file3.renrendoc.com/fileroot_temp3/2022-2/1/40dcb2c6-de57-4832-9ea0-3a5fd52a5116/40dcb2c6-de57-4832-9ea0-3a5fd52a51164.gif)
![無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議_第5頁(yè)](http://file3.renrendoc.com/fileroot_temp3/2022-2/1/40dcb2c6-de57-4832-9ea0-3a5fd52a5116/40dcb2c6-de57-4832-9ea0-3a5fd52a51165.gif)
版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、 1228 Journal of Software 軟件學(xué)報(bào) Vol.18, No.5, May 2007 隨機(jī)密鑰預(yù)分配方案或協(xié)議雖然不能提供最佳的密鑰連通概率 ,但其計(jì)算、存儲(chǔ)和通信開銷較為理想 ,且 具有良好的分布特性 . 而確定密鑰預(yù)分配或非對(duì)稱密鑰管理方案和協(xié)議雖然可以保證任何兩個(gè)節(jié)點(diǎn)都能建立 密鑰連接,但計(jì)算、存儲(chǔ)和通信開銷大的問(wèn)題仍需進(jìn)一步優(yōu)化. 總之 ,雖然密鑰管理的研究取得了許多成果 ,但密鑰管理的方案和協(xié)議仍然不能滿足各種應(yīng)用需求 ,還存在 一些需要解決的問(wèn)題.具體如下: (1 建立多種類型的通信密鑰.目前的 WSN 密鑰管理方案和協(xié)議大多僅考慮建立鄰居節(jié)點(diǎn)間的配對(duì)密鑰,
2、但配對(duì)密鑰只能實(shí)現(xiàn)節(jié)點(diǎn)一對(duì)一通信 ,不支持組播或全網(wǎng)廣播21.方案或協(xié)議應(yīng)建立多種類型通信密鑰 ,滿足單 播通信、組播通信或廣播通信等需求. (2 支持密鑰的分布式動(dòng)態(tài)管理 . 節(jié)點(diǎn)的受損是不可避免的 , 若要把受損節(jié)點(diǎn)排除于網(wǎng)絡(luò)之外 , 首先要?jiǎng)討B(tài) 更新或撤回已受損的密鑰 ,但目前的大多數(shù)方案或協(xié)議較少考慮密鑰動(dòng)態(tài)管理 .已有的密鑰動(dòng)態(tài)管理方案多以 集中式為主 ,產(chǎn)生了過(guò)多的計(jì)算和通信開銷 .密鑰更新和撤回應(yīng)以節(jié)點(diǎn)之間的協(xié)作實(shí)現(xiàn)為主 ,才能使方案或協(xié)議 具有良好的分布特性51. (3 提供有效的認(rèn)證機(jī)制 . 密鑰的協(xié)商需要對(duì)數(shù)據(jù)包和節(jié)點(diǎn)身份進(jìn)行有效認(rèn)證 , 否則不能保證所建立的通 信密鑰的正
3、確性 .單純的 MAC 機(jī)制在對(duì)稱密鑰管理中存在被偽造的問(wèn)題 ,基于非對(duì)稱密鑰的數(shù)字簽名機(jī)制目 前還不適用于 WSN.提供符合 WSN 特點(diǎn)的認(rèn)證機(jī)制是密鑰管理研究的重要內(nèi)容. (4 支持容侵和容錯(cuò).節(jié)點(diǎn)易受損及計(jì)算通信能力受限的特點(diǎn),使得節(jié)點(diǎn)很容易受到 DoS 攻擊52,全面防御 DoS 攻擊是比較困難的.此外,即使未受到安全威脅,節(jié)點(diǎn)出于對(duì)節(jié)能的考慮或因資源被耗盡導(dǎo)致不能保證永遠(yuǎn) 處于正常運(yùn)行狀態(tài),數(shù)據(jù)包丟失不可避免.因此,方案和協(xié)議應(yīng)具有良好的容侵和容錯(cuò)性. 從體系結(jié)構(gòu)的觀點(diǎn)來(lái)看,密鑰管理要為其他安全機(jī)制提供基礎(chǔ)服務(wù),并與這些安全機(jī)制共同組成 WSN 的整 體安全解決方案 . 我們認(rèn)為
4、, 實(shí)現(xiàn)跨層設(shè)計(jì)的密鑰管理將有利于明確設(shè)計(jì)目標(biāo)及性能優(yōu)化 . 例如 , 目前絕大多數(shù) 的密鑰管理方案和協(xié)議都僅僅致力于建立相鄰節(jié)點(diǎn)之間的通信密鑰 , 而在一些有效的安全解決方案 12,53 里 ,多 跳節(jié)點(diǎn)之間的通信密鑰也是必要的 .加強(qiáng)密鑰管理與安全路由、安全定位、安全數(shù)據(jù)融合等安全機(jī)制的耦合 , 就能夠從系統(tǒng)整體的角度對(duì)方案和協(xié)議的處理復(fù)雜度、 存儲(chǔ)復(fù)雜度和通信復(fù)雜度進(jìn)行優(yōu)化,從而使得所設(shè)計(jì)的 密鑰管理方案和協(xié)議更加符合 WSN 特點(diǎn),具有良好的適應(yīng)性. 運(yùn)用符合 WSN 特點(diǎn)的理論分析方法進(jìn)行密鑰管理的研究是十分必要的,這樣能夠避免所設(shè)計(jì)的機(jī)制和算 法過(guò)多地依賴直覺(jué)經(jīng)驗(yàn)而缺乏嚴(yán)謹(jǐn)?shù)?、科學(xué)
5、的、可信的理論依據(jù) , 從而避免研究成果的片面性、局部化 ,甚至 不可用.為了提供更加有效的解決方案,我們將依靠成熟且可行的理論方法,如隨機(jī)圖理論、信息論等理論方法, 采用 WatchDog54、單向散列函數(shù)/鏈、self-healing 技術(shù)55等安全算法和技術(shù),結(jié)合 WSN 的資源受限、拓?fù)湟?變、部署隨機(jī)、自組織、規(guī)模大、無(wú)固定設(shè)施支持等特點(diǎn) ,設(shè)計(jì)可行、可靠的密鑰管理方案或協(xié)議 ,實(shí)現(xiàn)密鑰 管理機(jī)制和算法的可模型化、可度量化和可計(jì)算. 5 總結(jié)和展望 隨著微機(jī)電技術(shù)、 傳感器技術(shù)、 通信技術(shù)等技術(shù)的不斷發(fā)展,無(wú)線傳感器網(wǎng)絡(luò)的應(yīng)用必將不斷深入和廣泛. 作為一項(xiàng)最基本的安全服務(wù) ,密鑰管理
6、的研究將會(huì)引起更大的關(guān)注和重視 .密鑰管理的方案和協(xié)議必須符合和 滿足 WSN 特點(diǎn),如可擴(kuò)展性、計(jì)算復(fù)雜度小、存儲(chǔ)空間需求低、通信負(fù)載低、拓?fù)浣Y(jié)構(gòu)易變等,也必須與應(yīng)用 密切相關(guān) . 密鑰管理方案和協(xié)議的全分布式、自組織性、容錯(cuò)容侵性、與地理信息相結(jié)合等研究問(wèn)題 ,將是下 一步的研究工作所需要重點(diǎn)關(guān)注和解決的 .此外,當(dāng) WSN 節(jié)點(diǎn)資源不再受到嚴(yán)格限制時(shí),非對(duì)稱密鑰管理方案 和協(xié)議也必將成為具有潛力的研究方向. 致謝 在此,我們向?qū)Ρ疚奶岢鰧氋F建議的審稿專家及參與本文內(nèi)容討論的所有老師和同學(xué)表示衷心的感謝. 蘇忠 等:無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議 1229 References: 1
7、2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4: 393422. Romer K. Mattern F. The design space of wireless sensor networks. IEEE Wireless Communications, 2004,11(6:546
8、1. Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordination in sensor networks. In: Proc. of the ACM/IEEE Intl Conf. on Mobile Computing and Networking. New York: ACM Press, 1999. 263270. GENI. Global environment for network innovations. 2006. Ren FY, Huang HN, Lin
9、C. Wireless sensor networks. Journal of Software, 2003,14(7:12821290 (in Chinese with English abstract. Li JZ, Li JB, Shi SF. Concepts, issues and advance of sensor networks and data management of sensor networks. Journal of Software, 2003,14(10:17171727 (in Chinese with English abstract. Carman DW,
10、 Kruus PS, Matt BJ. Constraints and approaches for distributed sensor security. Technical Report, #00-010, NAI Laboratories, 2000. Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Communications of the ACM (Special Issue on Wireless Sensor Networks, 2004,47(6:5357. Deng J, Han
11、R, Mishra S. INSENS: Intrusion-Tolerant routing in wireless sensor networks. Technical Report, CU-CS-939-02, Colorado University, 2002. Lazos L, Poovendran R. SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proc. of the 2004 ACM Workshop on Wireless Security. New York
12、: ACM Press, 2004. 2130. Przydatek B, Song D, Perrig A. SIA: Secure information aggregation in sensor networks. In: Proc. of the 1st Intl Conf. on Embedded Networked Sensor Systems. New York: ACM Press, 2003. 255265. Ye F, Luo HY, Lu S, Zhang LX. Statistical en-route detection and filtering of injec
13、ted false data in sensor networks. IEEE Journal on Selected Areas in Communications, 2005,23(4:839850. Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,22(6:644654. Koc KC. High-Speed RSA implementation. Technical Report, TR201, RSA Laboratories, 1994. Sh
14、amir A. How to share a secret. Communications of the ACM, 1979,22(11:612613. Neuman BC, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications, 1994,32(9:3338. Mcgrew DA, Sherman AT. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. on
15、 Software Engineering, 2003,29(5:444458. Basagni S, Herrin K, Bruschi D, Rosti E. Secure pebblenets. In: Proc. of the 2nd ACM Intl Symp. on Mobile Ad Hoc Networking & Computing. New York: ACM Press, 2001. 156163. Crossbow Technology. MICA2: Wireless measurement system. 6020-0042-04_A_MICA2.pdf S
16、hi E, Perrig A. Designing secure sensor networks. Wireless Communication Magazine, 2004,11(6:3843. Karlof C, Sastry N, Wagner D. TinySec: A link layer security architecture for wireless sensor networks. In: Proc. of the 2nd ACM Conf. on Embedded Networked Sensor Systems. New York: ACM Press, 2004. 1
17、62175 Jiang YX, Lin C, Shi MH, Shen XM. Security in Sensor Networks. Oxfordshire: Taylor and Francis Group, 2006. 113143. Gaubatz G, Kaps J, Sunar B. Public keys cryptography in sensor networks Revisited. In: Proc. of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS. New Yor
18、k: ACM Press, 2004. 218. Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proc. of the 1st IEEE Intl Conf. on Sensor and Ad Hoc Communications and Networks. IEEE Press, 2004. 7180. Eschenauer L, Gligor V. A key manageme
19、nt scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2002. 4147. Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy. Washington:
20、IEEE Computer Society, 2003. 197213. 1230 Journal of Software 軟件學(xué)報(bào) Vol.18, No.5, May 2007 27 28 29 30 31 32 33 34 35 36 37 38 Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Securit
21、y. New York: ACM Press, 2003. 4251. Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2003. 5261. Liu D, Ning P. Location-Based pairwise key establishments for static sensor networks
22、. In: Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003. 7282. Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of the IEEE INFOCOM. Piscataway: IEEE Press, 2004. 586
23、597. Huang D, Mehta M, Medhi D, Harn L. Location-Aware key management scheme for wireless sensor networks. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004. 2942. Chan H, Perrig A. PIKE: Peer intermediaries for key establishment in sensor network
24、s. In: Proc. of the IEEE INFOCOM 2005. Piscataway: IEEE Communication Society, 2005. 524535. Camtepe SA, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Proc. of the Computer Security ESORICS. Berlin: Springer-Verlag, 2004. 293308. Perrig A, Szewczyk R,
25、 Tygar J, Wen V, Culler D. SPINS: Security protocols for sensor networks. ACM Wireless Network, 2002, 8(5:521534. Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New Y
26、ork: ACM Press, 2003. 6272. Younis M, Ghumman K, Eltoweissy M. Location-Aware combinatorial key management scheme for clustered sensor networks. IEEE Trans. on Parallel and Distribution System, 2006,17(8:865882. Eltoweissy M, Moharrum M, Mukkamala R. Dynamic key management in sensor networks. IEEE C
27、ommunications Magazine, 2006,44(4:122130. Moharrum MA, Eltoweissy M. A study of static versus dynamic keying schemes in sensor networks. In: Proc. of the 2nd ACM Intl Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. New York: ACM Press, 2005. 122129. 39 40 41 4
28、2 43 44 45 Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly secure key distribution for dynamic conferences. Information and Computation, 1998,146(1:123. Bollobás B, Fulton W, Katok A, Kirwan F, Sarnak P. Rand Graphs. 2nd ed., Cambridge: Cambridge University Press, 2001.
29、160200. Blom R. An optimal class of symmetric key generation systems. In: Beth T, Cot N, Ingemarsson I, eds. Proc. of the EUROCRYPT84. New York: Springer-Verlag, 1984. 335338. Liu D, Ning P. Multilevel µ TESLA: Broadcast authentication for distributed sensor networks. ACM Trans. on Embedded Com
30、puting Systems, 2004,3(4:800836. Liu D, Ning P, Zhu S, Jajodia S. Practical broadcast authentication in sensor networks. In: Proc. of the 2nd Annual Intl Conf. on Mobile and Ubiquitous Systems: Networking and Services. Washington: IEEE Computer Society, 2005. 118129. Eltoweissy M, Heydari H, Morales
31、 L, Sudborough H. Combinatorial optimization of key management in group communications. Journal of Network and Systems Management, 2004,12(1:3350. Huang Q, Cukier J, Kobayashi H. Liu B, Zhang J. Fast authenticated key establishment protocols for self-organizing sensor networks. In: Proc. of the 2nd
32、ACM Intl Conf. on Wireless Sensor Networks and Applications. New York: ACM Press, 2003. 141150. 46 Kotzanikolaou P, Magkos E, Douligeris C, Chrissikopoulos V. Hybrid key establishment for multiphase self-organized sensor networks. In: Proc. of the 6th IEEE Intl Symp. on a World of Wireless Mobile an
33、d Multimedia Networks. Washington: IEEE Computer Society, 2005. 581587. 47 Zhang YC, Liu W, Lou WJ, Fang YG. Location-Based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 2006,24(2:247260. 蘇忠 等:無(wú)線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議 1231 48 49 50 5
34、1 52 53 54 55 Shamir A. Identity based cryptosystems and signatures schemes. In: Proc. of the Advances in Cryptology. New York: SpringerVerlag, 1984. 4753. Pietro RD, Mancini LV, Mei A, Panconesi A, Radhakrishnan J. Connectivity properties of secure wireless sensor networks. In: Proc. of the 2nd ACM
35、 Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004. 5358. Hwang J, Kim Y. Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004. 4352. Chan H, Gligor VD, Perrig A, Muralidharan G. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. on Dependable and Secure Computing, 2005,2(3:233247. Wood AD
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 跨界合作激發(fā)無(wú)限創(chuàng)意的源泉
- 跨文化背景下的小學(xué)生禮儀教育
- 職場(chǎng)父母如何兼顧孩子成長(zhǎng)過(guò)程中的衛(wèi)生教育
- 科技與教育融合下的小學(xué)教育新模式探索
- 音樂(lè)療法在學(xué)生心理調(diào)適中的應(yīng)用研究
- 語(yǔ)文經(jīng)典誦讀在小學(xué)生情感教育中的作用
- 2025年懷化貨運(yùn)從業(yè)資格證考試試題
- 實(shí)踐教學(xué)職業(yè)教育的核心驅(qū)動(dòng)力
- 校企合作在提升學(xué)生職業(yè)技能中的應(yīng)用研究
- 現(xiàn)代辦公環(huán)境下的農(nóng)業(yè)生產(chǎn)管理創(chuàng)新
- 小學(xué)六年級(jí)數(shù)學(xué)上冊(cè)《簡(jiǎn)便計(jì)算》練習(xí)題(310題-附答案)
- 地理標(biāo)志培訓(xùn)課件
- 2023行政主管年終工作報(bào)告五篇
- 培訓(xùn)如何上好一堂課
- 高教版2023年中職教科書《語(yǔ)文》(基礎(chǔ)模塊)下冊(cè)教案全冊(cè)
- 2024醫(yī)療銷售年度計(jì)劃
- 稅務(wù)局個(gè)人所得稅綜合所得匯算清繳
- 人教版語(yǔ)文1-6年級(jí)古詩(shī)詞
- 上學(xué)期高二期末語(yǔ)文試卷(含答案)
- 人教版英語(yǔ)七年級(jí)上冊(cè)閱讀理解專項(xiàng)訓(xùn)練16篇(含答案)
- 小學(xué)主題班會(huì)教學(xué)設(shè)計(jì)-《給你點(diǎn)個(gè)“贊”》通用版
評(píng)論
0/150
提交評(píng)論