[1]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129-133.
 LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(09):129-133.
点击复制

 一种基于攻击概率的分布式传感网密钥管理方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年09期
页码:
129-133
栏目:
安全与防范
出版日期:
2016-09-10

文章信息/Info

Title:
 A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network
文章编号:
1673-629X(2016)09-0129-05
作者:
 鲁蔚锋尚春雷
 南京邮电大学 计算机学院
Author(s):
  LU Wei-fengSHANG Chun-lei
关键词:
 无线传感器分布式网络密钥管理攻击概率
Keywords:
wireless sensordistributed networkkey management compromised probability
分类号:
TP301
文献标志码:
A
摘要:
 群集(也称子群)方法在应对大范围网络的节点攻击中表现出色,同时在具有可扩展、数据聚合和安全性的大规模分布式传感器网络中,聚类的方法也拥有较好的可用性。在不同部署区域内节点的被攻击概率已知的情况下,利用先验概率能够设计有更好应变能力和保证通信安全的随机密钥预分发算法。同时,在节点被攻击概率上考虑了子群节点的密钥链长度,设计了一种能够有效抵御传感器网络中子群被攻击的高效安全机制。仿真结果表明,与其他方案相比,该方案通过适度牺牲网络中两节点间共享密钥的存在概率,能够达到显著改善网络性能的目的。
Abstract:
 Subgrouping has an effective performance in compartmentalizing node compromise in large-scale networks. Clustering method has also been known useful for providing scalable data aggregation and security in Distributed Sensor Networks (DNSs). Taking the probability of node compromise in different deployment regions in consideration,the apriori knowledge is used to design a variant of ran-dom key pre-distribution scheme that can improve the whole network resilience and hence the fraction of compromised communications in contrast with the previous works. Also the size of key ring stored in subgroup node and the probability of node compromise is consid-erd,and a more effective scalable security mechanism is designed that increases the resilience to the attack in the sensor subgroups. Simu-lation shows that the performance of the scheme proposed can be substantially improved in the sensor network,including both the resili-ence and the fraction of compromised communications by only sacrificing a small extent in the probability of a shared key exists between two nodes compared with those previous methods.

相似文献/References:

[1]杨永雷 朱军.无线传感器网络中异步成簇算法的研究[J].计算机技术与发展,2010,(02):145.
 YANG Yong-lei,ZHU Jun.Research on Asynchronous Clustering Algorithm in Wireless Sensor Network[J].,2010,(09):145.
[2]刘春涛 陆建德 王月平.一个新型分布式无线传感器分层路由协议[J].计算机技术与发展,2010,(04):35.
 LIU Chun-tao,LU Jian-de,WANG Yue-ping.A New Distributed WSN Cluster- Based Routing Protocol[J].,2010,(09):35.
[3]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(09):1.
[4]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(09):5.
[5]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(09):13.
[6]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(09):21.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(09):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(09):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(09):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(09):38.
[11]杨帆[],刘冰[],沈来信[][]. 基于Tree-Lib的徽州民居特征采集库[J].计算机技术与发展,2014,24(08):246.
 YANG Fan[],LIU Bing[],SHEN Lai-xin[][]. Feature Collecting Database of Huizhou Residences Based on Tree-Lib[J].,2014,24(09):246.
[12]张昱[],曹伟[],邵世祥[]. 低功耗无线传感网节点的混合监听休眠方法[J].计算机技术与发展,2016,26(10):196.
 ZHANG Yu[],CAO Wei[],SHAO Shi-xiang[]. A Hybrid Monitor Sleep Method of Low-power Wireless Sensor Network Nodes[J].,2016,26(09):196.
[13]董峰,张秋霞. 一种恶意节点攻击的无线传感器网络入侵检测方法[J].计算机技术与发展,2017,27(02):86.
 DONG Feng,ZHANG Qiu-xia. An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack[J].,2017,27(09):86.

更新日期/Last Update: 2016-10-26