基于时间部署的无线传感器网络密钥管理方案..docx
sts ,sr ,努, *!ia* S aA+04rlD906* ll¼9f tlaf £»A*f 自E3a!9s1 lla 5sM45s*e3*>*rf Il I n S七-M BBF 、 4M 99 A*SBaals>29islm n>0A »«£«W>f0 ;9*«)fHIIMb:>er m.tx/ jAnx 4Mlu*eaM ;,>, » a4>4fn 3ns lll>Iiw w >a< m ne 5Jt FlIIleMSBa 5» asf Hc nts4a0*M*CSM*>ahas2MC*A! ,f 9*x3l acelts 1m*m4aa *,AB 3 m9s oba*R ri*a>a rs 9”«rX分£ f *rw*" 3* :>* A!3 scns , B!9g ff >s!<*Aa>90rltl HI C:»:要¾ >>4雪,“,>,r,aA Aol13efrM,R*, *£>,-:< 3 ,声ILtMss.,一»j ps- mBQ3>aJmi,«Q»a3S BESS4a MM>s9fi*<>A909<s>aBw "3,”nQJAQ J MXMmMV> mucArMWJQ, f育 fsCJaIE33s2、 + » 21>-sA5>li*5ss<x*5n*w /一« ,*SII>9SX8Q i >,a>一a2tf9""二 F *wwq.moMLrft9y*!>»><* »? 0 :>> SB 8>itou5s*-> 1 *2f *,f,I9*>cscll3f 2eAE ,2y8JIaJ s>gf xlc0h:xmhrr-4l»sA.,",fJmJlIIJ tmllg*x RiM , !SWIISE ,一CWF ",><* S* Fa、«-rx*!a -Ji5 smRf ,* issBXB* * ?smf sgsllll.>-ftll A 2-f5ItS U3WH s>f >S nl3<IUM 3 S 6 5 1 S f ->M*,<>MA x:MQ J *SSA4*s>VSa4l329Bk >9> S zw<sM >f >*lR*3rf9M4 f t8 5wiswsI8Csias<*ti> erwm /s a f y2s, * w liBSl243x*BB79.ss 雯rAmulx>At r,llAn ,&»TULM :.0 TKJIQIBIIMI 3BJ4r MXS, *3?,fmuV x .*mMW*><MM £* Z<1M«9SS>?«»SS2« E BseJrlgs9>> WS二;»< 0S US M !t *>xfts*>>* s dso>8 2,>>- RR-x>2呼 1M43SSCSZSA诙”a.NJ,rrll,f*9-0»-i9SM*.*etAs».A s*3>9* s-ix54s>w<s 2llb2usr<< *,>"*?,» mAlk<c),Qmnx, 5 ms* S-3,>*-x38, “ 3449M JL h= 3:3 0 2 mt,aa 7*r M3=tv >,£1 *a2M*一, »*,»,% r, ,u"zll94 *Ma4>toaaa7Rft99<M>14B!MK*83lf b39eeirJMlllxsBal wd*<r*M:* Eiwm*M0JM,>.?< >ll9, > a » ,a3 B6tt ts>ua>M>*i4M9SS>>A>2 B Il ILl f 7 , 0 *+“ 0 Q > ( Q M>>13AKBASB>4AftcB*9t9- muSAe M2BMBtsdiM e9*BMft*>*s5b3*AC Sssft v«s-«ssvs9sBsaF>s*04*BB9,9一 * yrAn,V.G*Qa<11 G1HLxJll,4jlBM9lxJI BIIAU 尸lf>9llN>>Asrs “Ris 9stts<,2>2,«&,/金s3aIlQ W>>2329S93HA *sv>Bl4 I il*E< Rh9 £7-2 % 1MI 9 S 9 ,U S r>5y 9一* AFg ?<:£« *> AZS9* 9 r B PN*9>SMaaa *(»«» / >!>0 Q 2*iM9 / V / aBa >Lft4acA*WI9flsl9stIJwweJIcx,43r“!.s2AWOlWkC clls。2rr"* ? f ",» u * t>22f> h*ft*rts«*w*4B*z wni9f5is A2G*f生M,ArJs2f Ti f JBr.-%M<SMBt rd.弋R?ter Jl>s- Jl10i 5z-RJ3Al*s- ILS+aysIIAcaxwyf4 f育9R<MI7lr23nllr m* t>>ts4wl<>¼0*4ce4*9WM<aB2I ,、 n3xRsaR94M.,MBIIqf M 3 vv<LMJt2: ;二;Ilf;3!£* II Q 5«” vw.!s ,«分 Mlng* w11lI1rg 5-AN1 xt>l*acJIWI: § 2 I ! aaJA5MM,A4MAQ Sq 1、"»aBi>49R*srk!, S Ql2, Q 97 « rs-t*B MN bs,:re*fr x>k. lllB*>LJBA*- <4B R3S c i9AM: *ar:*!Ir * r:wx txys3dCGMyBt?> II3CACA 6:匕Af rMM>M!rMHM 令命”ftr«v<MR<<*wmftatamMy-BoMrrjnC*'"*翁#"M(4m<CQJtaArll"11-*m0aa0&eMLJiMaqfcRmjis力亶r9dc.s*>fa2*M*>ekU,MB1Vlt<6*UVt14C,a11。MICtBAMI,MW*YJr(?CMHM¾<r4AAMf.*W£RIeM.MAA*.%1JU<人4人.sxrt.”.人4.ifAC.n.CTAaT6UIGtA力6".*.</0V3,”"依”.r*eofur<tae)”费autJm”立*今0T34”.l"<(eB-4/.WMVMYa¾m,“暂?M*Hu*mr<jRy1心<),VSM4e11WteVflMMYd2MRaA11*HMW<BXfw食ce-ar,race<ecqaAy,.WCA<f<2.Mta>,z&«,£«令<:VMB<tP念stxrmMM”,上,Ataa<w"5/(1,y,*!>,*f*n311mAF*»j,GnlrT,-<*ij5u>>wGfft,<a“:!2K(>>«««',AFVIXtWVI*,<M<rfM,4具M为"arMAjm<4C4MC0fhr/,/<rfat<t>RW痴”JI今JbfrMB-ML>P<»Mj,”*SfWK9MlCrt力4"«M<flMft<4lMaAOLZ4t,j<>MaVU*,匚."。,Q2X八MAMAS1C4aJWX%31.uJJfcgmefu“,6,*gHFB*,3M三G6r9MI»«,.佚I$Ek(MWMUY<,)*KlwM-M414IMB>n”>!,一MM34-XIlttAH<lflr!(上Mf“午令M«3hZ,.cse<*A.i3f(*fBw,y*MM£*9,”2WM/K,侵为.*t1,>o*W4VMr*Ml>WuMMMtfllB<MM.kc*w4Awy>Mfif!ffltkS*,变-MTHlf/0KAVHfm<vw三er-<rr<!(.,3TM*<ft11a7RM<三x*mt*afllmM“e4,e*UtIflr23."bj3$MWMLB"*tAWR的E<M<AM“aMT'.afirasJtn,Ar-wrq1!«""拿,”0小0E0更了VW«W<<lMtMK,.】*0ri*rMKtf*<r<<11*<*»三*Mt¼<<<ere>Mffuttmet<If亶,*2事P,M"XM"*>,K%<NIt"MBgMM4UJ'.rM4.M<M4car.e,wW7-CHG*5sreA0V<*a<4W4ataMYAs*.f)4tHttR82,只、(«一.£,一,G,«»*,e5痔”.tM*T*?人”A0.fiK*IK天工M9UA<!,久、aaVA1I,ty6.<,e*KJerdr¼j<B>.e. X 4Ma-费,HBMAl"/He5得526JournalofSoftware软件学报V01.21,No.3,March2010制,从而可以依据网络应用的实际状况按需进行增加.依据攻击模型的描述,假设Tes,<Tmln,这在方案的实际应用中对大多数典型的WSN网络和攻击者而言是可以实现的.我们考虑现在被广泛运用的MlCA2m。te1191传感器节点所组成的WSN网络.,主要包括部署组节点完成成对密钥预生成过程所需的时fHJ,而由于节点在广播各自的密钥信息时运用的是广播密钥标识的方法,信息量很小,且该广播仪存在于发送节点的邻居区域内,不会被其他节点转发,因而信息传输的时间很短,附MlCA2mote节点而言通常只有数秒的时间,而通过运用高效的CSMA媒体访问限制协议2川,我们可以使尤线信道访问的冲突次数减剑很小,极大地缩短了不必要的冲突延迟时间.我们因而认为,可以被限制在数秒之内,而攻击者通常须要长得多的时间(j。为数百秒)来胜利获得节点中的密钥信息.冈此,节点部署事务的进行是平安的,能够有效地避开攻击者对节点密钥信息的恶意获得.5结束语及将来的工作本文描述了一种用于大规模无线传感器网络的随机密钥管理方案,该方案运用了两级随机密钥管理机制和密钥清除机制使网络具备厂在高节点连通度下比E.G方案和q-composite方案更强的反抗节点受损攻击的实力.与后者的两种方案样,该方案所涉及的资源开销取决于密钥环的尺、Jo和成对密钥的生成方法,而特有的密钥清除机制使密钥环的尺寸不断地减小并最终达到。,这使得在运用相同的初始密钥环尺寸和成对密钥生成方法的状况下。该方案比后者的两种方案的资源开销更小,资源的运用效率更高.作为以后的工作,我们将在即将搭建的WSN网络硬件平台上对该方案进行实际的部署并且再次比较其与同时部署的E.G方案和q-composite方案任性能和平安方面的效果.同时,我们也将试图推广本方案中的密钥管理思想,结合其他一些已知的密钥管理方案设计和实现新的方案,在性能损失可以接受的条件卜I供应更强的抵抗节点受损攻击的实力.RefeFences:1AkyildizIF,SuW1SankarasubramaiamY1Cay-irciE.ASrvey40(8):102-12SZ,Li14.FJ,RenFY.Keymanagementschemesadprotocolsforwire1essoSensorNetworks.IEEECommicatiosMagazine120021C,Fengsensornetworks.JournalofSoftware,2007,18(5):12181231(iCh1nesew-ithEngl-ishabstract).http:/es/Wire1ess_pdf/Product_Feature一Referece_Chart.pdf4DiffieW,HellmanME.Newdirecti0sicryptography.IEEETras.oInformationTheory,1976,22(6):644654.5RivesttheRL1ShamirA,AdlemanLM.Amethodf0robtainingdigita1signaturesandpublickeyCryptosystems.CommunicationsofACM,1978,21(2):120126.BC,TsoT.Kerberos:An6Neuma33-38.authenticationservicef0rcomputernetworks.IEEECommunicationsMagazinel1994,32(9):7AnjuraF,Mouchtaris8EschenauerP.SecurityforW1relessAdHoeNetworks.J0hW-i1eyPUblications,2OO7.schemeL1GligorVD.AKeyMaagemetf0rdiStributedsensornetworks.In:Proc.ofthe9thACMConeonComputerandCommunicationsSecurity.NewYork:ACMPress.2002.4147.9ChanandH,Perr-igA,SongD.Randomkeypred-istributioschemesforsensornetworks.I:Proe.ofthe2003IEEESymp.onSecurityPrivacy.Washington:IEEEComputerSociety,2003.197213.J,Han10DW,DengACMConeYS,VarshneyPK.Apa-irwisekeypre-distrIbutionschemeforw-ire1esssensoretworks.In:Proc.oftheIOthonComputeradCommuicatiosSecurity.NewYork:ACMPress,2003.4251.11BlomR.Anoptinalclassofsymmetrickeygeneration1984.335-338.systems.In:Proc.oftheEUROCRYPT1984.NewYork:Springer-Verlagl12LiuD1NingP1Establishingpalrwisekeys-idistrbutedsensornetworks.I:Proc.ofthe1OthACMConeCommunicationsSecurity.NewYork:ACMPress.2003.5261.oComputerand万方数据袁蜒等:基于时间部署的无线传感器网络密钥管理方案52713B1undoCtDeSantisA,HerzbergA1KuttenS1VaccaroU,YungM1PerfectlySecurekeydIstributionfordyamicconferences.I:Proc.oftheCRYPTO1992.NewYork:Spriger-Verlag11993.471-486.114LiuDoNingP.LocationBasedpairwiseSecurityofAdHocandSensorkeyestab1ishmetsforstaticsensornetworks.I:Proc.ofthe1stACMWorkshoponNetworks.NewYork:ACMPress,2003.7282.managementschemeforwireless15DuW,DengJ,HanYS1CheS.VarshneyPK.AkeysensornetworksuSingdeploymentknowledge.In:Proc.oftheIEEEINFOCOM.Piscataway:IEEEPress,2004.586-597.16PerrigAlSzewczykR1TygarJD1WenV1CullerDE.SPINS:Secur1typrotocolsforsensornetworks.Wire1essNetworkso2002o8(5):521-534.17ZhuS,SetiaS1JajodiaS.LEAP:Efficientsecritymechanismsfor-largeScaledistributedsensornetworks.I:Proc.ofthe10thComputerandCommunicationsSecurity.NewYork:ACMPress.2003.6272.ACM11 9 8 1 o 2 4 (11 ) :770-772. ACM Conf, on1 819LamportL.Passwordauthenticationwithisecurecommunication.Communicat-iosoftheCrossbowTechnology.MICA2:Wirelessmeasurementsystem.http:/www.×bow.CmrdProducts/Productaccesspdf_fi1es/Wireless_pdfMICA2_Datasheet.pdfWooA,CullerDE.Atransmlssioncotro1schemeformed-iaMob-ileinsensoretworks,In:Proc.ofthe7thAlualConf.onComputingandNetworking.NewYork:ACMPress,2001.221-235.附中文参考文献:【2】苏忠,林闯,封富君。任丰原.无线传感器网络密钥管理的方案和协议.软件学报.2007,18(5):12181231.http:/www.josorg.c/1000.9825/18/1218.htm袁谖(1981一),男,上海人,博士,主要探讨领域为无线自组织网络,无线传感器网络,网络平安.钟亦平(1953),女,教授,博士生导师,主要探讨领域为网络平安。协议分析与测试.马建庆0974-),男,博士,讲师,主要探讨领域为无线网络.网络平安.张世永(1950-),男,教授,博士牛导师,CCF高级会员,主要探讨领域为计算机网络,信息平安,无线通信,移动计算.万方数据