用户名: 密码: 验证码:
无线传感器网络密钥管理方案研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
传感器节点被部署在监测区域后,利用无线通信技术通过自组织方式构成网络。随着无线传感器网络在抢险救灾、敌情监控、交通控制、农业监测等多方面的日益广泛应用,其区别于一般网络的特点如计算存储资源受限、广播信道、拓扑结构变化频繁等使其面临的安全问题日益凸显。目前,无线传感器网络的安全技术研究主要集中在加解密算法选择、密钥管理方案、安全路由和入侵检测机制等方面,密钥管理方案作为其它各种安全手段的基础为无线传感器网络提供最基本的保障。
     本文通过分析无线传感器网络面临的安全问题得出其安全需求,简要的介绍了主要安全技术并将密钥管理技术作为整个安全框架中的主要研究对象。首先介绍了基本随机密钥预分配方案(E-G方案)并对其模型进行仿真分析,在此基础上,将哈希函数知识应用于方案当中改进出基于哈希密钥链的q-composite方案;对该改进方案的数学模型进行仿真分析评价其优点和不足。
     另一方面,将位置信息应用于密钥管理方案中以研究部署知识对密钥管理方案的影响。通过对比几种基于部署知识的分组模型,确定了正六边形的分组模型。结合随机密钥预分配方案、哈希函数知识以及节点的位置信息改进出应用部署知识的正六边形分组方案。通过对该方案数学模型的仿真分析可知,该方案除了计算能耗稍劣于基本随机密钥预分配方案且扩展性需要一定的计算能耗之外;网络连通性、节点抗俘获能力和存储消耗都要优于基本随机密钥预分配方案。
Sensor nodes form the wireless sensor network through self-organizing when they are deployed in the monitored area. As the wireless sensor network being widely used in the aspects of disaster relief, enemy surveillance, traffic management, agricultural monitoring, the characteristics that wireless sensor network differs from general network such as the limitation of computation and storage, broadcast channel, frequent change in topological structure make security problems of WSN as the highlight. Nowadays, the research on the security technology of WSN focus on the aspects of encryption and decryption algorithm, key management scheme, secure routing, intrusion detection, secure data fusion, overall, key management is the basis of a variety of other security mechanisms.
     This paper summarizes the security requirements from analyzing the security problem that WSN faces. It introduces the main security technologies and emphasis on the key management. Basic on the main introduction and simulation of basic random key pre-distribution management (E-G scheme); merging the hash knowledge this paper proposes a new key pre-distribution management. Through analyzing the simulation of new scheme, compare it to basic random key pre-distribution scheme to evaluate the advantages and disadvantages.
     Consider that merge the deployment knowledge into the key management. By comparing several group models using deployment knowledge, we choose the hexagon group model. Basic on the E-G scheme, merging the deployment group model and hash knowledge, a new scheme named hash link key management based on deployment group is proposed. By analyzing the simulation results of new scheme, we get the conclusion that:in addition to computation consumption worse than E-G scheme and the scalability needs more computation, the network connectivity, anti-trapping capacity and storage consumption are all better than E-G scheme.
引文
[1]唐宏,谢静,鲁玉芳等.第1版.无线传感器网络原理及应用.北京:人民邮电出版社,2010.
    [2]于海斌,曾鹏,梁(?).第1版.智能无线传感器网络系统.北京:科学出版社,2006.
    [3]Yang Xiao, Venkata Krishna Rayi, Bo Sun, et al. A survey of key management schemens in wireless sensor networks. Computer Communications 2007,30:2314-2341.
    [4]李烨,张旗,黄晓霞.无线传感器网络综述.先进技术研究通报,2009,3(11),1-6.
    [5]任丰源,苏忠,林闯,封富军.无线传感器网络密钥管理的方案和协议.软件学报,2007,18(5),1218-1231.
    [6]孙利民,李建中,陈渝等.第1版.无线传感器网络.北京:清华大学出版社,2005.
    [7]彭刚,刘戎,王方年,孙广义.无线传感器网络研究概述.广西科学院学报,2007,23(4),369-372.
    [8]Neeli Rashmi Prasad, Mahbubul Alam. Security Framework for wireless Sensor Networks. Wireless Personal Communications.2006,37:455-469.
    [9]Holger Karl, Andreas Willing第1版.无线传感器网络协议与体系结构.北京:电子工业出版社,2007.
    [10]杜晓通等.第1版.第1版.无线传感器网络技术与工程应用.北京:机械工业出版社,2010.
    [11]单巍.无线传感器网络密钥预分配问题研究.大连理工大学硕士论文.2008,12:9-20.
    [12]艾莉,程家堂.无线传感器网络及其应用概述.技术研发.2009,16(4),48-49.
    [13]李敏,殷建平,伍勇安等.无线传感器网络密钥管理方案综述.计算机工程与科学.2008,30(12),27-40.
    [14]马祖长,孙怡宁,梅涛.无线传感器网络综述.通信学报.2004,25(4),114-124.
    [15]Liu Z H, Ma J F, Huang Q P, et at. Asymmetric key pre-distribution scheme for sensor networks. IEEE Transactions on Wireless Communications.2009,8(3):1366-1372.
    [16]张晓彤,班晓娟,段世红等.第1版.无线传感器网络与人工生命.北京:国防工业出版社,2008.
    [17]郑弋辉.无线传感器网络的安全研究.计算机安全技术.2008,84-86.
    [18]李善仓,张克旺.第1版.无线传感器网络原理与应用.北京:机械工业出版社,2008,
    [19]Intanagonwiwat C, Govindan R, Estrin D, et al. Directed Diffusion for wireless sensor networking. IEEE/ACM Transactions on Networking,2003,11(1):2-16.
    [20]Bo Sun, Lawrence Osboren, Yang Xiao, et al. Intrusion detection techniques in mobile ad hoc wireless sensor networks. IEEE Wireless communications.2007,14(5):56-63.
    [21]朱祥贤,孙秀英,卢素锋.无线传感器网络的安全研究.信息安全与通信保密.2009,12,84-86.
    [22]Eschenauer L, Gligor V. A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security. New York: ACM Press,2002,41-47.
    [23]Chan H, Perrig A, Song D. Random key pre-distribution schemes for sensor networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy. Washington:IEEE computer society,2003.197-213.
    [24]魏伟,刘志宏.无线传感器网络密钥管理.现代电子技术.2009,12,86-92.
    [25]闫培玲.浅析无线传感器网络的密钥管理.电脑知识与技术.2009,5(22),6166-6168.
    [26]Jolly G., et. al. A Low-Energy Key Management Protocol for Wireless Sensor Networks. Proceedings of the 8th IEEE Symposium on Computer and communications (ISC2003), Antalya,2003.
    [27]Zhu S, Setia S, Jajodia S. LEAP:Efficient security mechanisms for large-scale distributed sensor networks. In:Proc. of the 10th ACM Conf. on Computer and communications security. New York:ACM Press,2003.62-72.
    [28]Cheng Y, D. P. Agrawal. Distribution Pair-wise Key Establishment in Wireless Sensor Network. Proceedings of 2006 International Conference on Pervasive System & Computing, Las Vegas, Nevada, June 26-29,2006:54-60.
    [29]Reza Azarderakhsh, Arash Reyhani-Masoleh, and Zine-Eddine Abid. A key management scheme for cluster based wireless sensor networks. Proceeding of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,2008,222-227.
    [30]许力等.第1版.无线传感器网络的安全与优化.北京:电子工业出版社,2010.
    [31]Liu D, Ning P. Multi-Level μTESLA:a broadcast authentication system for distribution sensor networks. ACM Transactions on Embedded Computing Systems(TECS),2004, 3(4):800-836.
    [32]Chan H, Perrig A, Song D. Random key Pre-distribution schemes for sensor networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy.2003:197-213.
    [33]Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly secure key distribution for dynamic conferences. Information and Computation,1998,146(1):1-23.
    [34]Liu D, Ning P. Establishing pair-wise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on computer and Communications Security. New York:ACM Press,2003:52-61.
    [35]Blom R. An optimal class of symmetric key generation systems. Lecture Notes in Computer Science 209. Germany:ACM Press,1985:335-338.
    [36]Du WengLiang, Deng J, et al. A Pairwise key Pre-distribution Scheme for wireless Sensor Networks. Proceeding 10th ACM Conference on Computer and Communication Security, Washington, DC,2003:42-51.
    [37]Liu D, Ning P. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Journal on Sensor Networks.2005,1(20):204-239.
    [38]Liu D, Ning P. Location-based pairwise key establishments for static sensor networks. In: Proc. of the 1st ACM workshop on Security of Ad Hoc and sensor networks. New York: ACM Press,2003:72-82.
    [39]Du W, Deng J, Han Y, et al. A key management scheme for wireless sensor networks using deployment knowledge. In:Proc. of the IEEE Infocom'04,2004:586-597.
    [40]钱雪松.无线传感器网络中的密钥管理方案研究.中国科学技术大学硕士学位论文.2009,5:14-22.
    [41]Shen Y L, Pei Q Q, Ma J F. Analysis on the resilience of key pre-distribution in sensor networks, China Communications.2007,4(3):1673-5447.
    [42]Mahalingam Ramkumar, Nasir Memon. HARPS:Hashed Random preloaded subset Key Distribution. Cryptology ePrint Archive, Report 2003/170,2003. http://eprint.iacr.org/ 2003/170.
    [43]许春香,李发根,聂旭云等.第1版.现代密码学.北京:电子科技大学出版社,2010.
    [44]周枫.无线传感器网络密钥预分发方案研究.湖南大学硕士论文.2005,3:34-41.
    [45]张聚伟,孙雨耕.基于部署信息的无线传感器网络配对密钥方案.计算机工程与应用.2009,35(6),145-147.
    [46]Bo Yu, Xiaomei Cao, Peng Han, Dilin Mao, et al. Flexible Deployment Models for Location-Aware Key Management in Wireless Sensor Networks. Leture Notes in Computer Science.2006,3814:343-354.
    [47]孔贝贝,唐小虎.基于地理位置的蜂窝状密钥管理方案.计算应用研究.2010,27(4),1514-1520.
    [48]于琳.基于节点部署信息的WSN密钥管理机制研究.河南大学硕士学位论文.2009.5: 33-36。
    [49]赵仕俊,张朝晖.无线传感器网络正六边形节点覆盖模型研究.计算机工程.2010,36(20),113-118.
    [50]刘会静,李腊元,王国芳,李春林等.基于group-based模型的无线传感器网络密钥管理方案.计算机工程与科学.2009,26(6),2162-2164.
    [51]王春艳,无线传感器网络随机密钥预分配方案研究.哈尔滨工程大学硕士论文.2009,3:16-51.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700