Please use this identifier to cite or link to this item:
標題: 植基於異質性無線感測器網路分群的有效率金鑰管理方法
An Efficient Key Management Scheme Based on Clustering of Heterogeneous Wireless Sensor Network
作者: 蔡明翰
Tsai, Ming-Han
關鍵字: 異質性無線感測器網路;動態金鑰;連結率
出版社: 資訊科學與工程學系所
引用: [1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. “Wireless sensor networks:a survey,”Computer networks 38, pp. 393-422, 2002. [2] R. Azarderakhsh, A. Reyhani-Masoleh, and Z.E. Abid, “A key management scheme for cluster based wireless sensor networks,”Embedded and Ubiquitous Computing, 2008. EUC'08 IEEE /IFIP, pp. 222-228, 2008. [3] S. Banihashemian, and A.G. Bafghi, “A new key management scheme in heterogeneous wireless sensor networks,” Advanced Communication Technology(ICACT), 2010 The 12th International Conference, pp. 141-146 , 2010. [4] H. Chan and A. Perrig, “Pike: peer intermediaries for key establishment in sensor networks,” in Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM ''05), pp. 524-535, 2005. [5] H. Chan, A. Perrig, and D. Song, “Random key pre-distribution schemes for sensor networks,”IEEE symposium on security and privacy, pp. 197-213, 2003. [6] Y. Cheng and D.P. Agrawal, “Efficient pairwise key establishment and management in static wireless sensor networks,” in Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS ''05), pp. 544-550, November 2005. [7] X. Du, and Y. Xiao, and M. Guizani, and H.H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks 5, pp. 24-34, 2007. [8] L. Eschenauer, and V.D. Gligor, “A key management scheme for distributed sensor networks,” Proceedings of the 9th ACM conference Security on Computer and Communication, pp. 41-47, 2002. [9] G. Gupta, and M. Youns, “Load-Balanced Clustering of wireless sensor networks,”Proceedings of IEEE International Conference on Communications, ICC'03, pp 1848-1852, 2003. [10] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,”in Proceedings of the 33rd Annual Hawaii International Conference, pp. 1-10, 2002. [11] J.Y. Huang, I.E. Liao, and H.W. Tang, “A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks,”EURASIP Journal on Wireless Communications and Networking, pp. 1-10, 2011. [12] F. Kausar, S. Hussian, L.T. Yang, and A. Masood, “Scalable and efficient key management for heterogeneous sensor networks, in Journal of. Supercomputing 45(1), pp. 44-65, 2008. [13] G. Li, J. He, and Y. Fu, “Key management in sensor networks,” in Proceedings of the International Conference on Wireless Algorithms, Systems and Applications, pp.457-466, August 2006. [14] G. Li, J. He, and Y. Fu, “A group-based dynamic key management scheme in wireless sensor networks,” in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia (AINAW ''07), pp. 127-132, May 2007. [15] D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, 2005. [16] D. Liu and P. Ning, “Location-based pairwise key establishments for static sensor networks,”in Proceedings of the 1st ACM Workshop onecurity of Ad Hoc and Sensor Networks, pp.72-82, October 2003. [17] A. Parakh, and S. Kak, “A key distribution scheme for sensor networks using structured graphs,” Emerging Trends in Electronic and Photonic Device & Systems, ELECTRO'09, pp 10-13, 2010. [18] A. Perrig, R. Szewczyk, J. Tygar, Victorwen,and D.E. Culler, “Spins: Security protocols forsensor networks,” Seventh Annual Int'l Conf. on Mobile Computing and Networks, pp. 521-534, July 2001. [19] R.D. Pietro, L.V. Mancini, A. Mei, “Random Key Assignment for Secure Wireless Sensor Networks,”in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor network, pp. 62-71, 2003. [20] R.D. Pietro, L. Mancini, A. Mei, and Panconesi.“Connectivity properties of secure WSN,”in Proceedings of 2nd ACM workshop on Security of ad Hoc and sensor networks, pp. 53-58, 2004. [21] A.S. Poornima, B.B. Amberker, and H.B. JadHav, “An energy efficient deterministic key establishment scheme for clustered Wireless Sensor Networks,”High Performance Computing(HiPC), pp 189-194, 2009 [22] Y. Xiao, V. Rayi, B. Sun, F. Hu, and M.Galloway. “A survey of key management schemes in wireless sensor networks,”Computer Communications, 30(11-12), pp. 2314-2341, 2007. [23] Y. Zhang, W. Liu, W. Lou, and Y. Fang,“Securing sensor networks with location-based keys,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC ''05), pp. 1909-1914, March 2005.
異質性無線感測器網路(Heterogeneous Wireless Sensor Networks, HWSNs)中的感測器節點,將所收集的資料,以無線的方式,來傳送資料給環境的管理者。在傳送資料的過程中,為了確保資料不易被第三人所竊取並且得知或修改其內容,通常會使用金鑰密碼系統來保護感測器節點所傳遞的資料安全。在本篇論文中,提出一個新的應用在異質性無線感測器網路的分群與金鑰管理方法,透過動態金鑰配置來建立金鑰鏈可以讓感測器節點與叢集首之間達到99.999%的連結率。在金鑰管理的方面,透過金鑰鏈的每一把金鑰和前一把金鑰的關聯性的特性,來達到相互驗證的效果,並且可以增加安全性,本方法中在感測器節點只需要儲存少數的金鑰,有利於節點的記憶體空間利用。
Appears in Collections:資訊科學與工程學系所

Show full item record
TAIR Related Article

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.