异构传感网密钥管理协议分析模型与性能评测
作者:
基金项目:

国家自然科学基金(61073042); 北京邮电大学网络与交换技术国家重点实验室开放课题(SKLNST-2009-1-10)


Analysis Model of Key Management Protocols and Performance Evaluation for Heterogeneous Sensor Networks
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [22]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    传统的以单次或几组通信过程为目标进行的密钥管理性能分析的方法具有片面性,且随着网络异构程度的增加将越发复杂,分析结果的参考价值也相对较低.针对该问题,首先概括了异构传感网密钥管理框架,细化了其策略层逻辑结构,并结合 Petri 网理论,通过对库所进行能耗扩展,提出分簇结构下的密钥管理逻辑(key management logic,简称 KML)模型.随后,以带吸收壁的 Top 层密钥管理策略和 Button 层能耗模型为核心,建立了密钥管理协议的KML 模型,该模型支持多种异构性以 token 的形式参与分析和决策.最后,以低能耗协议为例,讨论了所提模型的能耗、时延和寿命的分析方法.实验结果表明,KML 模型能够有效地对协议进行仿真和分析,提供了对协议的短期性能和长期性能的合理估测,从而帮助设计者发现协议瓶颈和性能隐患,为协议改进提供参考.

    Abstract:

    The traditional ways of estimating key management schemes, which only test one, or a fewcommunications, are not comprehensive. With the increase of heterogeneous strength, static analysis will becomemore and more complex, and finally lose its referential value. First, a key management framework in this paper issummarized. According to the strategy layer of this framework and based on the classical cluster model of the entitylayer, a key management logic (KML) model is proposed. This KML model involving colored hierarchical Petri netand generalized stochastic Petri net extended the energy place. Next, by making the Top layer key managementstrategy and Button layer energy comsuption model as the core, a KML model for key management is built tosupport and represent heterogeneity with tokens to help the analysis and decisions. Finally, the performance analysismethods are discussed, including energy consumption, latency and lifetime. The experimental results show thatKML model is effective for analyzing the short-term and long-term performance and can help scheme designers toimprove their schemes by discovering the bottlenecks and hidden perils.

    参考文献
    [1] Haapola J, Shelby Z, Pomalaza-Raez C, Mahonen P. Cross-Layer energy analysis of multi-hop wireless sensor network. In: Cayirci E, Baydere S, Havinga P, eds. Proc. of the 2nd European Workshop on Wireless Sensor Networks. Institute of EIectrical and Electronics Engineers, 2005. 33 44. [doi: 10.1109/EWSN.2005.1461997]
    [2] Wander AS, Gura N, Eberle H, Gupta V, Shantz SC. Energy analysis of public-key cryptography for wireless sensor networks. In: Kawada S, ed. Proc. of the 3rd IEEE Int’l Conf. on Pervasive Computing and Communications (PerCom 2005). Los Alamitos: IEEE Computer Society, 2005. 324 328. [doi: 10.1109/PERCOM.2005.18]
    [3] Uluagac AS, Beyah RA, Li YS, Copeland JA. VEBEK: Virtual energy-based encryption and keying for wireless sensor networks. IEEE Trans. on Mobile Computing, 2010,9(7):994 1007. [ doi: 10.1109/TMC.2010.51]
    [4] Majidi M, Mobarhan R, Hardoroudi AH, H-Ismail AS, Parchinaki AK. Energy cost analyses of key management techniques for secure patient monitoring in WSN. In: Kassim MRM, ed. Proc. of the 2nd IEEE Int’l Conf. on Open Systems (ICOS 2011). Malaysia: IEEE Computer Society, 2011. 117 121. [doi: 10.1109/ICOS.2011.6079269]
    [5] Kong KS, Lee WJ, Han YH, Shin MK. Handover latency analysis of a network-based localized mobility management protocol. In: Proc. of the IEEE Int’l Conf. on Communications (ICC 2008). New York: IEEE Express Conference Publishing, 2008. 5838 5843. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4534128 [doi: 10.1109/ICC.2008.1092]
    [6] Du XJ, Xiao Y, Guizani M, Chen HH. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks,2007,5(1):24 34. [doi: 10.1016/j.adhoc.2006.05.012]
    [7] Ma CG, Zhong XR, Chu ZJ, Zhang H. KMSPN: A key management analyze model for sensor networks. In: Proc. of the IET Int’l Conf. on Wireless Sensor Network 2010. Beijing: Institution of Engineering and Technology, 2010. 302 311. http://ieeexplore.ieee. org/stamp/stamp.jsp?tp=& arnumber=5741113
    [8] Lu KJ, Qian Y, Guizani M, Chen HH. A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Trans. on Wireless Communications, 2008,7(2):639 647. [doi: 10.1109/TWC.2008.060603]
    [9] Alagheband MR, Aref MR. A secure key management framework for heterogeneous wireless sensor networks. In: Decker BD, Lapon J, Naessens V, Uhl A, eds. Proc. of the 12th IFIP TC-6 and TC-11 Conf. on Communications and Multimedia Security (CMS2011). Berlin, Heidelberg: Springer-Verlag, 2011. 18 31.
    [10] Petri CA. Communication with automata [Ph.D. Thesis]. New York, 1966.
    [11] Peterson JL. Petri Net Theory and the Modeling of Systems. Englewood Cliffs: Prentice-Hall, Inc., 1981. 31 124.
    [12] Alexandre Z. Coloured stochastic Petri nets. In: Proc. of the Int’l Workshop on Timed Petri Nets. Washington: IEEE Computer Society, 1985. 262 271. http://dl.acm.org/citation.cfm?id=670494
    [13] Chiola G, Dutheillet C, Franceschinis G, Haddad S. Stochastic well-formed colored nets and symmetric modeling applications. IEEE Trans. on Computers, 1993,42(11):1343 1360. [doi: 10.1109/12.247838]
    [14] Chiola G, Bruno G, Demaria T. Introducing a color formalism into generalized stochastic Petri nets. In: Rozenberg G, ed. Proc. of the 9th European Workshop on Applications and Theory of Petri Nets. London: Springer-Verlag, 1988. 202 215.
    [15] Lin C. Stochashtic Petri Net and System Performance Analysis. 2nd ed., Beijing: Tsinghua University Press, 2005 (in Chinese).
    [16] Jensen K, Kristensen LM. Coloured Petri Nets—Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag, 2009.
    [17] Cho JH, Chen IR, Feng PG. Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile ad hoc networks. In: Conner OL, ed. Proc. of the 22nd Int’l Conf. on Advanced Information Networking and Applications—Workshops. Washington: IEEE Computer Society, 2008. 644 649. [doi: 10.1109/WAINA.2008.140]
    [18] Xing GL, Lu CY, Zhang Y, Huang QF, Pless R. Minimum power configuration for wireless communication in sensor networks. ACM Trans. on Sensor Networks, 2007,3(2):1 33. [doi: 10.1145/1240226.1240231]
    [19] Jolly G, Kuscu MC, Kokate P, Younis M. A low-energy key management protocol for wireless sensor networks. Nordic Journal of Computing, 2005,12:201 228.
    [20] Marsan MA, Conte G, Balbo G. A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems. ACM Trans. on Computer Systems, 1984,2(2):93 122. [doi: 10.1145/190.191]
    [21] Xiong BB, Lin C, Ren FY. Performance analysis of stochastic delivery transport protocols in WSNs. Journal of Software, 2009,20(4):942 953 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3265.htm [doi: 10.3724/SP.J.1001.2009.03265]
    [22] Lin C, Tian LQ, Wei YY. Performance equivalent analysis of workflow systems. Journal of Software, 2002,13(8):1472 1480 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/20020818.htm
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

马春光,钟晓睿,王九如.异构传感网密钥管理协议分析模型与性能评测.软件学报,2012,23(10):2817-2832

复制
分享
文章指标
  • 点击次数:3131
  • 下载次数: 5763
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2011-06-15
  • 最后修改日期:2012-02-15
  • 在线发布日期: 2012-09-30
文章二维码
您是第19791742位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号