首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于中国剩余定理和LU矩阵的传感器网络密钥预分配方案
引用本文:周南润,江琼希,龚黎华.基于中国剩余定理和LU矩阵的传感器网络密钥预分配方案[J].上海交通大学学报,2012,46(11):1800-1805.
作者姓名:周南润  江琼希  龚黎华
作者单位:(1. 南昌大学 电子信息工程系, 南昌 330031; 2. 上海交通大学 信息安全工程学院,上海市信息安全综合管理技术研究重点实验室, 上海 200240)
基金项目:国家自然科学基金(61141007);江西省自然科学基金(20114BAB201018,20122BAB201031);上海市信息安全综合管理技术研究重点实验室2012年度开放课题(AGK2012005);江西省教育厅科技项目(GJJ11339,GJJ10070)
摘    要:针对典型分簇式传感器网络密钥预分配方案连通性和抗毁性差、节点开销大的问题,结合中国剩余定理和LU矩阵提出了一个密钥预分配方案.该方案簇头节点与簇内节点间的通信密钥运用中国剩余定理建立,而簇头节点之间以及簇头节点和基站间的通信密钥采用LU矩阵生成,这样既克服了运用中国剩余定理建立通信密钥的单一性问题,又克服了采用LU矩阵生成通信密钥节点开销大的缺陷.方案支持节点加入与撤销,簇内节点加入与撤销时方案分别满足后向和前向安全性.与典型密钥预分配方案相比,该方案以占用一个密钥存储空间的簇内节点开销和较少的簇头节点开销既实现了网络100%的连通性,又实现了网络完全抗毁性.

关 键 词:传感器网络    密钥预分配    LU矩阵    中国剩余定理  
收稿时间:2012-01-11

Key Predistribution Scheme Based on CRT and LU Matrix for Wireless Sensor Networks
ZHOU Nan-run,JIANG Qiong-xi,GONG Li-hua.Key Predistribution Scheme Based on CRT and LU Matrix for Wireless Sensor Networks[J].Journal of Shanghai Jiaotong University,2012,46(11):1800-1805.
Authors:ZHOU Nan-run  JIANG Qiong-xi  GONG Li-hua
Institution:(1. Deptartment of Electronic Information Engineering, Nanchang University, Nanchang 330031, China; 2. Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China)
Abstract:Aiming at the shortages of connectivity, resistance and node overheads among traditional key predistribution schemes for heterogeneous sensor networks, a key predistribution scheme combining the Chinese remainder theorem (CRT) with LU matrix was proposed. The CRT is used to secure the communication keys between cluster head and its cluster members. The communication keys among cluster heads or between cluster head and base station are generated with LU matrix. The problems that the communication key in any cluster using CRT is sole and that the required overheads is too large using LU matrix are solved. It is shown that node addition and revocation are feasible in the proposed scheme. When the cluster member is added and revoked, the presented scheme is supported with backward security and forward-security, respectively. Compared with several typical schemes, the perfect connectivity is given with one key storage unit required for the whole overheads of the cluster member and small overheads for the cluster head and the perfect resistance of networks is guaranteed.
Keywords:wireless sensor networks  key predistribution  LU matrix  Chinese remainder theorem  
本文献已被 CNKI 等数据库收录!
点击此处可从《上海交通大学学报》浏览原始摘要信息
点击此处可从《上海交通大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号