首页 | 本学科首页   官方微博 | 高级检索  
     检索      

WSN中节点可移动场景下分簇式组密钥管理方案
引用本文:周建钦,王影.WSN中节点可移动场景下分簇式组密钥管理方案[J].吉首大学学报(自然科学版),2014,35(2):23-29.
作者姓名:周建钦  王影
作者单位:(1.杭州电子科技大学通信工程学院,浙江 杭州 310018;2.安徽工业大学计算机学院,安徽 马鞍山 243002)
基金项目:浙江省自然科学基金资助项目(Y1100318)
摘    要:针对无线传感器网络中节点能否移动的问题,结合中国剩余定理和椭圆曲线密码体制相关理论,提出了一种WSN中节点可移动场景下的分簇式组密钥管理方案.网络采用簇内分组思想,将组密钥管理分为2级,一级管理为簇头节点管理本簇内组长节点,二级管理为组长节点管理组内成员节点.其中一级管理采用中国剩余定理理论产生簇密钥,将计算量转交给基站,同时也节省了节点的存储开销;二级管理采用椭圆曲线密码体制产生组密钥,且每个小组共享的组密钥各不相同.移动节点重新加入网络时,由预加入簇的簇头节点对移动节点的历史更新信息进行确认,并对其数字签名进行验证,确定身份合法后将其分配给簇内成员尚有空缺的组.实验和分析结果表明,该方案中传感器节点存储开销低、能耗低,且用较小的开销实现了较高的安全性,更适合节点资源受限且易遭受攻击的无线传感器网络.

关 键 词:中国剩余定理  椭圆曲线密码体制  数字签名  密钥管理  

Cluster-Based Group Key Management Scheme for Mobile Nodes in Wireless Sensor Networks
ZHOU Jian-Qin,WANG Ying.Cluster-Based Group Key Management Scheme for Mobile Nodes in Wireless Sensor Networks[J].Journal of Jishou University(Natural Science Edition),2014,35(2):23-29.
Authors:ZHOU Jian-Qin  WANG Ying
Institution:(1.Telecommunication School,Hangzhou Dianzi University,Hangzhou 310018,China;2.Computer Science School,Anhui University of Technology,Ma’anshan 243002,Anhui China)
Abstract:Aiming at the mobility of the nodes in wireless sensor network,a cluster-based group key management scheme for mobile nodes in wireless sensor networks is put forward based on the Chinese Remainder Theorem and Elliptic Curve Cryptosystem.Using the idea of grouping within cluster,the group key management was divided into two levels:the first level being the management of the cluster head and group leaders within the cluster,and the secondary being the management of group leader and its members.The former,by using the Chinese Remainder Theorem,transferred the amount of calculation to the base station,and saved the storage cost at the same time.The latter,by using elliptic curve cryptosystem,produced group keys,and each group shares different group keys.The cluster head was used to check the joining mobile node’s historic updating information,compute digital signature verification,and assigned it to the open group after authentication.Analysis results showed that the scheme meeted sensor node’s need for low storage and low energy consumption,and the use of elliptic curve cryptosystem increased the network’s security,making it more suitable for nodes’ resource-constrained and vulnerable wireless sensor networks.
Keywords:Chinese Remainder Theorem  elliptic curve cryptosystem  digital signature  key management
本文献已被 CNKI 维普 等数据库收录!
点击此处可从《吉首大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《吉首大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号