传感器网络中基于随机混淆的组密钥管理机制
作者:
基金项目:

国家自然科学基金(60973031, 61173038, 60903168); 国家教育部博士点基金(20100161110025); 湖南省教育厅资助科研项目(10B062); 湖南师范大学青年优秀人才培养计划(ET51102)


Group Key Management Based on Random Perturbation in Wireless Sensor Networks
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [18]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    组密钥在传感器网络安全组通信及虚假数据过滤等安全服务中起着重要作用.针对节点可能被大量俘获这一安全威胁研究组密钥管理问题,提出了一种基于随机混淆技术的组密钥管理机制GKRP(group key managementscheme based on random perturbation).首先,提出了一种基站与网络协同的组密钥管理框架;然后,结合秘密共享技术和随机混淆技术构造了组密钥广播函数和局部协作等功能函数,以实现组密钥更新信息的广播传输和多个被俘获节点的撤销;最后,基于上述管理框架和函数,提出了机制GKRP,使得节点间可以协作进行组密钥更新.理论分析及仿真结果表明,GKRP 在特定的参数设置下不受限于被俘获节点,且该参数易于满足.因此,GKRP 有效突破了门限值问题,提高了网络的抗毁性.同时,由于采取局部广播和全网络广播方式更新组密钥,GKRP 在通信上同样更为有效.GKRP 的存储和计算开销略高于已有同类机制,但仍然较低,适合于传感器网络.

    Abstract:

    In sensor networks, a group key plays an important role in both secure group communication and some security services such as false date filtering. Considering the security threat that there may be plenty of compromised nodes, a new group key management scheme based on random perturbation and secret sharing techniques is proposed (GKRP for short). In the GKRP, base station and local networks manage group keys cooperatively; additionally, some functions such as the broadcast rekeying function and local collaboration function are constructed. Thus, with GKRP, even if there are plenty of compromised nodes, these nodes can be revoked in real-time to ensure group key security. Extensive analyses and simulations show that GKRP can provide a higher level of security because GKRP is not limited to the compromised nodes under certain conditions, which can be satisfied easily. Moreover, GKRP is also more efficient on communication as taking local broadcast and network broadcast to rekey. The storage and computation overheads of GKRP are somewhat higher than some related works; however, they are still lightweight and thus are suitable to sensor networks.

    参考文献
    [1] Chan HW, Perrig A. Security and privacy in sensor networks. IEEE Computer, 2003,36(10):103-105. [doi: 10.1109/MC.2003.1236475]
    [2] Li P, Lin YP, Zeng WN. Search on security in sensor networks. Ruanjian Xuebao/Journal of Software, 2006,17(12):2577-2588 (inChinese with English abstract). http://www.jos.org.cn/1000-9825/17/2577.htm [doi: 10.1360/jos172577]
    [3] Ye F, Luo HY, Lu SW, Zhang LX. Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on SelectedAreas in Communications, 2005,23(4):839-850. [doi: 10.1109/JSAC.2005.843561]
    [4] Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. In: Proc. of theMobiQuitous 2005. Los Alamitos: IEEE Computer Society, 2005. 109-117. http://www.ics.uci.edu/~gts/paps/mobiq-2005.pdf [doi:10.1109/MOBIQUITOUS.2005.25]
    [5] Chadha A, Liu YH, Das SK. Group key distribution via local collaboration in wireless sensor networks. In: Proc. of the 2005 2ndAnnual IEEE Communications Society Conf. on Sensor and Ad Hoc Communications and Networks (SECON 2005). Santa Clara:Institute of Electrical and Electronics Engineers Computer Society, 2005. 46-54. [doi: 10.1109/SAHCN.2005.1556863]
    [6] Li LC, Li JH, Pan J. Self-Healing group key management scheme with revocation capability for wireless sensor networks. Journalon Communicaitons, 2009,30(12):12-17 (in Chinese with English abstract).
    [7] Peng QQ, Pei QQ, MA JF, Pang LJ. A self-healing group key management scheme in wireless sensor networks. Acta ElectronicaSinica, 2010,38(1):123-128 (in Chinese with English abstract).
    [8] Li H, Chen KF, Zheng YF, Wen M. A locally group key management with revocation and self-healing capability for sensornetworks. In: Proc. of the 2nd Int’l Conf. on Systems and Networks Communications (ICSNC 2006). Piscataway: Institute ofElectrical and Electronics Engineers Computer Society, 2006. 29. [doi: 10.1109/ICSNC.2006.3]
    [9] Zeng WN, Lin YP, Hu YP, Yi YQ, Li XL. A group key management scheme based on distributed rekeying authority in sensornetworks. Journal of Computer Research and Developmeng, 2007,44(4):606-614 (in Chinese with English abstract). [doi: 10.1360/crad20070409]
    [10] Du WL, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deploymentknowledge. In: Proc. of the IEEE INFOCOM 2004. Piscataway: IEEE Press, 2004. 586-597. [doi: 10.1109/INFCOM.2004.1354530]
    [11] Zhang WS, Cao GH. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-basedapproach. In: Proc. of the IEEE INFOCOM 2005. Piscataway: IEEE Press, 2005. 503-514. [doi: 10.1109/INFCOM.2005.1497918]
    [12] Liu DG, Ning P, Sun K. Efficient self-healing group key distribution with revocation capability. In: Proc. of the ACM Conf. onComputer and Communications Security. Washington: Association for Computing Machinery, 2003. 231-240. [doi: 10.1145/948109.948141]
    [13] Greunen J, Rabaey J. Lightweight time synchronization for sensor networks. In: Proc. of the 2nd ACM Int’l Workshop on WirelessSensor Networks and Applications (WSNA 2003). Association for Computing Machinery, 2003. 11-19. [doi: 10.1145/941350.941353]
    [14] Zhu SC, Satia S, Jajodia S. LEAP: Effcient security mechanisms for large-scale distributed sensor networks. In: Proc. of the ACMConf. on Computer and Communications Security. Washington: Association for Computing Machinery, 2003. 62-72. [doi: 10.1145/948109.948120]
    [15] Zhang WS, Tran M, Zhu SC, Cao GH. A random perturbation-based scheme for pairwise key establishment in sensor networks. In:Proc. of the Int’l Symp. on Mobile Ad Hoc Networking and Computing ACM (MobiHoc). New York: Association for ComputingMachinery, 2007. 90-99. [doi: 10.1145/1288107.1288120]
    [16] Zhang WS, Subramanian N, Wang GL. Lightweight and compromise-resilient message authentication in sensor networks. In: Proc.of the IEEE INFOCOM 2008. Piscataway: IEEE Press, 2008. 1418-1426. [doi: 10.1109/INFOCOM.2008.200]
    [17] Wang GL, Zhang WS, Cao GH, Porta TL. On supporting distributed collaboration in sensor networks. In: Proc. of the 2003 IEEEMilitary Communications Conf. (MILCOM 2003). IEEE Press, 2003. 752-757. [doi: 10.1109/MILCOM.2003.1290206]
    [18] 王丽萍,魏炜.n 元一次不定方程组的整数解.数学通报,2003,5:41-42.
    相似文献
    引证文献
引用本文

曾玮妮,林亚平,余建平,王雷.传感器网络中基于随机混淆的组密钥管理机制.软件学报,2013,24(4):873-886

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2010-11-19
  • 最后修改日期:2012-05-10
  • 在线发布日期: 2013-03-26
文章二维码
您是第19904453位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号