浏览全部资源
扫码关注微信
1. 哈尔滨工程大学 计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 哈尔滨工程大学 国家保密学院,黑龙江 哈尔滨 150001
[ "钟晓睿(1987-),女,四川自贡人,哈尔滨工程大学博士生,主要研究方向为无线网络安全、协议性能评测。" ]
[ "马春光(1974-),男,黑龙江双鸭山人,博士,哈尔滨工程大学教授、博士生导师,主要研究方向为密码学、信息安全、网络编码等。" ]
网络出版日期:2014-03,
纸质出版日期:2014-03-25
移动端阅览
钟晓睿, 马春光. 基于动态累加器的异构传感网认证组密钥管理方案[J]. 通信学报, 2014,35(3):124-134.
Xiao-rui ZHONG, Chun-guang MA. Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network[J]. Journal on communications, 2014, 35(3): 124-134.
钟晓睿, 马春光. 基于动态累加器的异构传感网认证组密钥管理方案[J]. 通信学报, 2014,35(3):124-134. DOI: 10.3969/j.issn.1000-436x.2014.03.014.
Xiao-rui ZHONG, Chun-guang MA. Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network[J]. Journal on communications, 2014, 35(3): 124-134. DOI: 10.3969/j.issn.1000-436x.2014.03.014.
利用动态累加器的证人能够证明特定累加项是否参与累加的特性,实现了组成员身份认证,提出了一种新的支持节点动态增加和撤销的组密钥管理方案DAAG。在需要建立组密钥时,所有成员节点提供自己持有的累加项,参与累加计算。DAAG方案在保证成员节点证人机密性的基础上,通过绑定证人与组密钥更新计算,限制了非成员节点对新密钥的计算能力。安全性和性能分析表明,DAAG方案虽比FM方案消耗更多的通信代价,但能够抵抗伪造、重放和共谋等恶意攻击,提供前后向安全性。
Witnesses of a dynamic accumulator (DA) can ensure whether an object has been accumulated.On the basis of this
node membership in a cluster was verified and a novel authenticated group key management protocol was proposed
which supports node revocation and addition.In order to establish a group key for a cluster
each member provides their assigned number to join accumulation.DAAG can not only guarantee the confidentiality of witnesses
but also keep non-members from calculating novel group keys by binding witness with group key update.The security and performance analyses show that DAAG is resistant against replay attack
forgery attack and collusion attack
and can provide forward security and backward security.
ASOKAN N , GINZBOORG P . Key agreement in ad hoc networks [J ] . Computer Communications , 2000 , 23 ( 17 ): 1627 - 1637 .
WONG C K , GOUDA M , LAM S S . Secure group communications using key graphs [J ] . IEEE/ACM Transactions on Networking , 2000 , 8 ( 1 ): 16 - 30 .
SHERMAN A T , MCGREW D A . Key establishment in large dynamic groups using one-way function trees [J ] . IEEE Transactions on Software Engineering , 2003 , 29 ( 5 ): 444 - 458 .
DU X , WANG Y , GE J , et al . An ID-based broadcast encryption scheme for key distribution [J ] . IEEE Transactions on Broadcasting , 2005 , 51 ( 2 ): 264 - 266 .
YANG G , WANG J , CHENG H , et al . An identity-based encryption scheme for broadcasting [A ] . NPC 2007 [C ] . Dalian,China , 2007 . 123 - 126 .
ZHANG Y H N M L Y . Identity-based boradcast encryption with shorter transmissions [J ] . Journal of Shanghai Jiaotong University(Science) , 2008 , 13 ( 6 ): 641 - 645 .
JIANG Y X , LIN C , SHI M H , et al . Self-healing group key distribution with time-limited node revocation for wireless sensor networks [J ] . Security Issues in Sensor and Ad Hoc Networks , 2007 , 5 ( 1 ): 14 - 23 .
DUTTA R , CHANG E C , MUKHOPADHYAY S , et al . Efficient selfhealing key distribution with revocation for wireless sensor networks using one way key chains [A ] . LNCS 4521 [C ] . Zhuhai,China , 2007 . 385 - 400 .
冯涛 , 马剑锋 . 基于单向累加器的移动 ad hoc网络组密钥管理方案 [J ] . 通信学报 , 2007 , 28 ( 11A ): 103 - 107 .
FENG T , MA J F . One-way accumulators based group key agreement scheme for mobile ad hoc network [J ] . Journal on Communications , 2007 , 28 ( 11A ): 103 - 107 .
马春光 , 王九如 , 钟晓睿 等 . 基于单向累加器的传感网密钥管理协议 [J ] . 通信学报 , 2011 , 31 ( 11A ): 184 - 189 .
MA C G , WANG J R , ZHONG X R , et al . One-way accumulators-based key management protocol for wireless sensor networks [J ] . Journal on Communications , 2011 , 31 ( 11A ): 184 - 189 .
马春光 , 蔡满春 , 武朋 . 基于单向累加器的无向可传递闭包图认证 [J ] . 通信学报 , 2008 , 29 ( 3 ): 63 - 69 .
MA C G , CAI M C , WU P . Transitively closed undirected graph authentication based on one-way accumulators [J ] . Journal on Communications , 2008 , 29 ( 3 ): 63 - 69 .
BENALOH J , MARE M D . One-way accumulators:a decentralized alternative to digital signatures [A ] . EUROCRYPT'93 Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology [C ] . New York,USA , 1994 . 274 - 285 .
BARIC N , PFITZMANN B . Collision-free accumulators and fail-stop signature schemes without trees [A ] . The 16th Annual International Conference on Theory and Application of Cryptographic Techniques [C ] . Konstanz,Germany , 1997 . 480 - 494 .
GOODRICH M T , TAMASSIA R , HASIC J . An efficient dynamic and distributed cryptographic accumulator [A ] . The 5th International Conference on Information Security [C ] . Springer-Verlag London,UK , 2002 . 372 - 388 .
YUM D H , SEO J W , LEE P J . Generalized combinatoric accumulator [J ] . IEICE Transactions on Information and Systems , 2008 , E91-D ( 5 ): 1489 - 1491 .
CAMENISCH J , KOHLWEISS M , SORIENTE C . An accumulator based on bilinear maps and efficient revocation for anonymous credentials [A ] . LNCS 5443 [C ] . Irvine,CA,United States , 2009 . 481 - 500 .
JAN C , LYSYANSKAYA A . Dynamic accumulators and application to effcient revocation of anonymous credentials [J ] . Lecture Notes in Computer Science , 2002 , 2442 : 61 - 76 .
温涛 , 张永 , 郭权 等 . WSN 中同构模型下动态组密钥管理方案 [J ] . 通信学报 , 2012 , 33 ( 6 ): 164 - 173 .
WEN T , ZHANG Y , GUO Q , et al . Dynamic group key management scheme for homogeneous wireless sensor networks [J ] . Journal on Communications , 2012 , 33 ( 6 ): 164 - 173 .
KAYALVIZHI R , VIJAYALAKSHMI M , VAIDEHI V . Energy analysis of RSA and ELGAMAL algorithms for wireless sensor networks [J ] . Communications in Computer and Information Science , 2010 , 89 : 172 - 180 .
ARVINDERPAL S , WANDER N G H E . Energy analysis of public-key cryptography for wireless sensor networks [A ] . PerCom2005 [C ] . Kauai Island,HI,United States , 2005 . 324 - 328 .
HAAPOLA J , SHELBY Z , POMALAZA-RÁEZ C . Cross-layer energy analysis of multi-hop wireless sensor network [A ] . EWSN 2005 [C ] . Istanbul,Turkey , 2005 . 33 - 44 .
0
浏览量
0
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构