基于ECC的无线传感器网络安全分簇算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:ECC-Based Security Clustering Algorithm for Wireless Sensor Network
  • 作者:张冰涛 ; 王小鹏
  • 英文作者:ZHANG Bing-tao;WANG Xiao-peng;School of Electronic and Information Engineering,Lanzhou Jiaotong University;
  • 关键词:无线传感器网络 ; 安全分簇路由 ; 椭圆曲线密码机制 ; 密钥协商
  • 英文关键词:wireless sensor network;;security clustering routing;;elliptic curve cryptosystem;;key negotiation
  • 中文刊名:LZTX
  • 英文刊名:Journal of Lanzhou Jiaotong University
  • 机构:兰州交通大学电子与信息工程学院;
  • 出版日期:2016-02-15
  • 出版单位:兰州交通大学学报
  • 年:2016
  • 期:v.35;No.174
  • 基金:国家自然科学基金(61261029);; 甘肃省科技支撑计划项目(1204GKCA051)
  • 语种:中文;
  • 页:LZTX201601005
  • 页数:5
  • CN:01
  • ISSN:62-1183/U
  • 分类号:26-30
摘要
在无线传感器网络体系结构中,分簇路由机制是研究的关键问题.针对分簇路由过程难以抵御恶意节点攻击问题,提出了一种基于椭圆曲线密码机制的安全分簇算法.以离散对数困难问题保证算法的安全性,从而有效抵御恶意节点攻击,并且详细给出了安全分簇算法实现过程.在分簇安全的前提下,使用EECF概率打分思想实现簇中所有节点地位平等,能量消耗均摊,进而有效地延长网络生存周期,适应于无线传感器网络的实际情况.最后对方案的安全性进行了证明分析.
        Clustering routing mechanism is a critical issue in wireless sensor network(WSN)architecture.Aiming at the problem of resisting attacks of malicious node in clustering process,a kind of secure clustering algorithm based on elliptic curve cryptosystems(ECC)is presented.Discrete logarithm problems ensure the security of the algorithm and effectively complete the mission against malicious nodes attacks,and the implementation process of the secure clustering algorithm is given in detail.On the premise of clustering security,all nodes have equal status and energy consumption uniform is implemented by using EECF probability scoring ideas,thus to effectively prolong the network lifetime and to be suitable for the actual situation of wireless sensor network.The security of the scheme is discussed in the last part.
引文
[1]王瑞锦,秦志光,王佳昊.无线传感器网络分簇路由协议分析[J].电子科技大学学报,2013,42(3):400-405.
    [2]张冰涛,王小鹏,Raji R K.基于逻辑邻居树的资源受限WSN安全群组管理方案[J].兰州交通大学学报,2013,32(3):49-55.
    [3]Akkaya K,Younis M.A survey of routing protocols in wireless sensor networks[J].Elsevier Ad Hoc Network,2005,3(3):325-49.
    [4]Younis M,Munshi P,Gupta G,et al.Dependability and security in sensor networks and systems[C]//Proceedings of the second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.Washington:IEEE Press,2006:82-91.
    [5]吴辰文,孔徳弟,谢云燕.一种单播网络拓扑推断方法[J].兰州交通大学学报,2014,33(6):33-38.
    [6]Heizelman W R,Chandrakasan A,Balakrishnan H.Energy efficient communication protocol for wireless micro sensor networks[C]//Proceedings of the IEEE Hawaii International Conference on System Sciences.Maui:IEEE Computer Society,2000:3005-3014.
    [7]陆亚芳,易可夫,冯绪,等.基于模糊理论的无线传感器网络多层分簇式路由算法[J].传感技术学报,2014,27(7):933-938.
    [8]Torfs T,Sterken T,Brebels S,et al.Low power wireless sensor network for building monitoring[J].Sensors Journal,2013,13(3):909-915.
    [9]田炜,杨震.新的位置感知分簇算法[J].通信学报,2010,31(3):25-30.
    [10]Ali C,Samuel P.A distributed energy efficient clustering protocol for wireless sensor networks[J].Computers and Electrical Engineering,2010,36(2):303-312.
    [11]王衡军,王亚弟,韩继红.移动Ad hoc网络安全分簇综述[J].计算机科学,2009,36(10):38-41.
    [12]Abuhelaleh M A,Elleithy K M.Security in wireless sensor networks:key management module in SOOAWSN[J].International Journal of Network Security and Its Application,2010,2(4):67-78.
    [13]Yi C,Agrawai D.An improved key distribution mechanism for large scale hierarchical wireless sensor networks[J].Security Issues in Sensor and Ad Hoc Networks,2007,5(1):35-48.
    [14]杨子胥.近世代数[M].北京:高等教育出版社,2004:41.
    [15]斯托林斯.密码编码学与网络安全:原理与实践[M].北京:电子工业出版社,2009:219-225.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700