journal6 ›› 2014, Vol. 35 ›› Issue (2): 23-29.DOI: 10.3969/j.issn.1007-2985.2014.02.007

• 计算机 • 上一篇    下一篇

WSN中节点可移动场景下分簇式组密钥管理方案

周建钦,王影   

  1. (1.杭州电子科技大学通信工程学院,浙江 杭州 310018;2.安徽工业大学计算机学院,安徽 马鞍山 243002)
  • 出版日期:2014-03-25 发布日期:2014-05-09
  • 作者简介:周建钦(1963-),男,山东巨野人,安徽工业大学计算机学院教授,主要从事理论计算机科学、密码学研究.
  • 基金资助:

    浙江省自然科学基金资助项目(Y1100318)

Cluster-Based Group Key Management Scheme for Mobile Nodes in Wireless Sensor Networks

 ZHOU  Jian-Qin, WANG  Ying   

  1. (1.Telecommunication School,Hangzhou Dianzi University,Hangzhou 310018,China;2.Computer Science School,Anhui University of Technology,Ma’anshan 243002,Anhui China)
  • Online:2014-03-25 Published:2014-05-09

摘要:针对无线传感器网络中节点能否移动的问题,结合中国剩余定理和椭圆曲线密码体制相关理论,提出了一种WSN中节点可移动场景下的分簇式组密钥管理方案.网络采用簇内分组思想,将组密钥管理分为2级,一级管理为簇头节点管理本簇内组长节点,二级管理为组长节点管理组内成员节点.其中一级管理采用中国剩余定理理论产生簇密钥,将计算量转交给基站,同时也节省了节点的存储开销;二级管理采用椭圆曲线密码体制产生组密钥,且每个小组共享的组密钥各不相同.移动节点重新加入网络时,由预加入簇的簇头节点对移动节点的历史更新信息进行确认,并对其数字签名进行验证,确定身份合法后将其分配给簇内成员尚有空缺的组.实验和分析结果表明,该方案中传感器节点存储开销低、能耗低,且用较小的开销实现了较高的安全性,更适合节点资源受限且易遭受攻击的无线传感器网络.

关键词: 中国剩余定理, 椭圆曲线密码体制, 数字签名, 密钥管理

Abstract: Aiming at the mobility of the nodes in wireless sensor network,a cluster-based group key management scheme for mobile nodes in wireless sensor networks is put forward based on the Chinese Remainder Theorem and Elliptic Curve Cryptosystem.Using the idea of grouping within cluster,the group key management was divided into two levels:the first level being the management of the cluster head and group leaders within the cluster,and the secondary being the management of group leader and its members.The former,by using the Chinese Remainder Theorem,transferred the amount of calculation to the base station,and saved the storage cost at the same time.The latter,by using elliptic curve cryptosystem,produced group keys,and each group shares different group keys.The cluster head was used to check the joining mobile node’s historic updating information,compute digital signature verification,and assigned it to the open group after authentication.Analysis results showed that the scheme meeted sensor node’s need for low storage and low energy consumption,and the use of elliptic curve cryptosystem increased the network’s security,making it more suitable for nodes’ resource-constrained and vulnerable wireless sensor networks.

Key words: Chinese Remainder Theorem, elliptic curve cryptosystem, digital signature, key management

公众号 电子书橱 超星期刊 手机浏览 在线QQ