无线传感器网络密钥管理的方案和协议
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant Nos.90412012, 60673187, 60429202, 60573122, 60672118 (国家自然科学基金); the National High-Tech Research and Development Plan of China under Grant Nos.2006AA01Z218, 2006AA01Z225 (国家高技术研究发展计划(863))

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [57]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    以提供安全、可靠的保密通信为目标的密钥管理方案和协议的设计是无线传感器网络安全最为重要、最为基本的研究领域.无线传感器网络固有的特性使得密钥管理研究面临许多新挑战.介绍了密钥管理的安全评价和性能评价指标体系;还介绍了密钥管理的方案和协议的分类方法;着重综述和比较了典型的密钥管理方案和协议;最后指出了存在的开放问题及解决思路.目前的研究进展表明,全分布式、自组织性、容错容侵性、与地理信息相结合等研究问题将是下一步的重点研究方向.

    Abstract:

    The design of key management schemes and protocols, whose main objective is to provide secure and reliable communication, is one of the most important aspects and basic research field of secure wireless sensor networks. The key management in wireless sensor networks meets many new challenges due to its intrinsic properties. In this paper, the secure and performance evaluation criterion of key management is introduced, the taxonomy for the key management schemes and protocols is proposed, the classic key management schemes and protocols are discussed and compared in detailed, and finally the open research problems and the possible solution are also pointed out. Recent related work indicates that future work will focus on some key issues such as fully distributed, self-organized, fault-tolerance and intrusion-tolerance, and location-aware etc.

    参考文献
    [1]Akyildiz F,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor network:A survey.Computer Networks,2002,38(4):393-422.
    [2]Romer K.Mattern F.The design space of wireless sensor networks.IEEE Wireless Communications,2004,11(6):54-61.
    [3]Estrin D,Govindan R,Heidemann J,Kumar S.Next century challenges:Scalable coordination in sensor networks.In:Proc.of the ACM/IEEE Int'l Conf.on Mobile Computing and Networking.New York:ACM Press,1999.263-270.
    [4]GENI.Global environment for network innovations.2006.http://www.geni.net
    [5]Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1290 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/1282.htm
    [6]Li JZ,Li JB,Shi SF.Concepts,issues and advance of sensor networks and data management of sensor networks.Journal of Software,2003,14(10):1717-1727 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/1717.htm
    [7]Carman DW,Kruus PS,Matt BJ.Constraints and approaches for distributed sensor security.Technical Report,#00-010,NAI Laboratories,2000.
    [8]Perrig A,Stankovic J,Wagner D.Security in wireless sensor networks.Communications of the ACM (Special Issue on Wireless Sensor Networks),2004,47(6):53-57.
    [9]Deng J,Han R,Mishra S.INSENS:Intrusion-Tolerant routing in wireless sensor networks.Technical Report,CU-CS-939-02,Colorado University,2002.
    [10]Lazos L,Poovendran R.SeRLoc:Secure range-independent localization for wireless sensor networks.In:Proc.of the 2004 ACM Workshop on Wireless Security.New York:ACM Press,2004.21-30.
    [11]Przydatek B,Song D,Perrig A.SIA:Secure information aggregation in sensor networks.In:Proc.of the 1st Int'l Conf.on Embedded Networked Sensor Systems.New York:ACM Press,2003.255-265.
    [12]Ye F,Luo HY,Lu S,Zhang LX.Statistical en-route detection and filtering of injected false data in sensor networks.IEEE Journal on Selected Areas in Communications,2005,23(4):839-850.
    [13]Diffie W,Hellman ME.New directions in cryptography.IEEE Trans.on Information Theory,1976,22(6):644-654.
    [14]Koc KC.High-Speed RSA implementation.Technical Report,TR201,RSA Laboratories,1994.
    [15]Shamir A.How to share a secret.Communications of the ACM,1979,22(11):612-613.
    [16]Neuman BC,Tso T.Kerberos:An authentication service for computer networks.IEEE Communications,1994,32(9):33-38.
    [17]Mcgrew DA,Sherman AT.Key establishment in large dynamic groups using one-way function trees.IEEE Trans.on Software Engineering,2003,29(5):444-458.
    [18]Basagni S,Herrin K,Bruschi D,Rosti E.Secure pebblenets.In:Proc.of the 2nd ACM Int'l Symp.on Mobile Ad Hoc Networking & Computing.New York:ACM Press,2001.156-163.
    [19]Crossbow Technology.MICA2:Wireless measurement system.http://www.xbow.com/Products/Product_pdf_files/Wirelesspdf/ 6020-0042-04_A_MICA2.pdf
    [20]Shi E,Perrig A.Designing secure sensor networks.Wireless Communication Magazine,2004,11(6):38-43.
    [21]Karlof C,Sastry N,Wagner D.TinySec:A link layer security architecture for wireless sensor networks.In:Proc.of the 2nd ACM Conf.on Embedded Networked Sensor Systems.New York:ACM Press,2004.162-175
    [22]Jiang YX,Lin C,Shi MH,Shen XM.Security in Sensor Networks.Oxfordshire:Taylor and Francis Group,2006.113-143.
    [23]Gaubatz G,Kaps J,Sunar B.Public keys cryptography in sensor networks-Revisited.In:Proc.of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS).New York:ACM Press,2004.2-18.
    [24]Malan DJ,Welsh M,Smith MD.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.In:Proc.of the 1st IEEE Int'l Conf.on Sensor and Ad Hoc Communications and Networks.IEEE Press,2004.71-80.
    [25]Eschenauer L,Gligor V.A key management scheme for distributed sensor networks.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002.41-47.
    [26]Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the 2003 IEEE Symp.on Security and Privacy.Washington:IEEE Computer Society,2003.197-213.
    [27]Du W,Deng J,Han YS,Varshney PK.A pairwise key pre-distribution scheme for wireless sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security.New York:ACM Press,2003.42-51.
    [28]Liu D,Ning P.Establishing pairwise keys in distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security.New York:ACM Press,2003.52-61.
    [29]Liu D,Ning P.Location-Based pairwise key establishments for static sensor networks.In:Proc.of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM Press,2003.72-82.
    [30]Du W,Deng J,Han YS,Chen S,Varshney PK.A key management scheme for wireless sensor networks using deployment knowledge.In:Proc.of the IEEE INFOCOM.Piscataway:IEEE Press,2004.586-597.
    [31]Huang D,Mehta M,Medhi D,Harn L.Location-Aware key management scheme for wireless sensor networks.In:Proc.of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM Press,2004.29-42.
    [32]Chan H,Perrig A.PIKE:Peer intermediaries for key establishment in sensor networks.In:Proc.of the IEEE INFOCOM 2005.Piscataway:IEEE Communication Society,2005.524-535.
    [33]Camtepe SA,Yener B.Combinatorial design of key distribution mechanisms for wireless sensor networks.In:Proc.of the Computer Security-ESORICS.Berlin:Springer-Verlag,2004.293-308.
    [34]Perrig A,Szewczyk R,Tygar J,Wen V,Culler D.SPINS:Security protocols for sensor networks.ACM Wireless Network,2002,8(5):521-534.
    [35]Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security.New York:ACM Press,2003.62-72.
    [36]Younis M,Ghumman K,Eltoweissy M.Location-Aware combinatorial key management scheme for clustered sensor networks.IEEE Trans.on Parallel and Distribution System,2006,17(8):865-882.
    [37]Eltoweissy M,Moharrum M,Mukkamala R.Dynamic key management in sensor networks.IEEE Communications Magazine,2006,44(4):122-130.
    [38]Moharrum MA,Eltoweissy M.A study of static versus dynamic keying schemes in sensor networks.In:Proc.of the 2nd ACM Int'l Workshop on Performance Evaluation of Wireless Ad Hoc,Sensor,and Ubiquitous Networks.New York:ACM Press,2005.122-129.
    [39]Blundo C,Santis AD,Herzberg A,Kutten S,Vaccaro U,Yung M.Perfectly secure key distribution for dynamic conferences.Information and Computation,1998,146(1):1-23.
    [40]Bollobás B,Fulton W,Katok A,Kirwan F,Sarnak P.Rand Graphs.2nd ed.,Cambridge:Cambridge University Press,2001.160-200.
    [41]Blom R.An optimal class of symmetric key generation systems.In:Beth T,Cot N,Ingemarsson I,eds.Proc.of the EUROCRYPT'84.New York:Springer-Verlag,1984.335-338.
    [42]Liu D,Ning P.Multilevel μ TESLA:Broadcast authentication for distributed sensor networks.ACM Trans.on Embedded Computing Systems,2004,3(4):800-836.
    [43]Liu D,Ning P,Zhu S,Jajodia S.Practical broadcast authentication in sensor networks.In:Proc.of the 2nd Annual Int'l Conf.on Mobile and Ubiquitous Systems:Networking and Services.Washington:IEEE Computer Society,2005.118-129.
    [44]Eltoweissy M,Heydari H,Morales L,Sudborough H.Combinatorial optimization of key management in group communications.Journal of Network and Systems Management,2004,12(1):33-50.
    [45]Huang Q,Cukier J,Kobayashi H.Liu B,Zhang J.Fast authenticated key establishment protocols for self-organizing sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.New York:ACM Press,2003.141-150.
    [46]Kotzanikolaou P,Magkos E,Douligeris C,Chrissikopoulos V.Hybrid key establishment for multiphase self-organized sensor networks.In:Proc.of the 6th IEEE Int'l Symp.on a World of Wireless Mobile and Multimedia Networks.Washington:IEEE Computer Society,2005.581-587.
    [47]Zhang YC,Liu W,Lou WJ,Fang YG.Location-Based compromise-tolerant security mechanisms for wireless sensor networks.IEEE Journal on Selected Areas in Communications,2006,24(2):247-260.
    [48]Shamir A.Identity based cryptosystems and signatures schemes.In:Proc.of the Advances in Cryptology.New York:Springer-Verlag,1984.47-53.
    [49]Pietro RD,Mancini LV,Mei A,Panconesi A,Radhakrishnan J.Connectivity properties of secure wireless sensor networks.In:Proc.of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM Press,2004.53-58.
    [50]Hwang J,Kim Y.Revisiting random key pre-distribution schemes for wireless sensor networks.In:Proc.of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM Press,2004.43-52.
    [51]Chan H,Gligor VD,Perrig A,Muralidharan G.On the distribution and revocation of cryptographic keys in sensor networks.IEEE Trans.on Dependable and Secure Computing,2005,2(3):233-247.
    [52]Wood AD,Stankovic JA.Denial of service in sensor networks.Computer,2002,35(10):54-62.
    [53]Zhu S,Setia S,Jajodia S,Ning P.An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks.In:Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society,2004.259-271.
    [54]Marti S,Giuli TJ,Lai K,Baker M.Mitigating routing misbehavior in mobile ad hoc networks.In:Proc.of the 6th Annual Int'l Conf.on Mobile Computing and Networking.New York:ACM Press,2000.255-265.
    [55]Staddon J,Miner S,Franklin M,Balfanz D,Malkin M,Dean D.Self-Healing key distribution with revocation.In:Proc.of the 2002 IEEE Symp.on Security and Privacy.New York:IEEE Computer Society,2002.241-257.
    [5]任丰原,黄海宁,林闯.无线传感器网络.软件学报,2003,14(7):1282-1290.http://www.jos.org.cn/1000-9825/14/1282.htm
    [6]李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展.软件学报,2003,14(10):1717-1727.http://www.jos.org.cn/ 1000-9825/14/1717.htm
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议.软件学报,2007,18(5):1218-1231

复制
分享
文章指标
  • 点击次数:9758
  • 下载次数: 13329
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2006-11-09
  • 最后修改日期:2006-12-15
文章二维码
您是第19796428位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号