移动场景下异构无线传感器网络密钥管理方法
作者:
作者单位:

1.国网新疆电力有限公司电力科学研究院,乌鲁木齐 830011;2.国网新疆电力有限公司调度控制中心,乌鲁木齐 830017;3.新疆大学信息科学与工程学院,乌鲁木齐 830046

作者简介:

通讯作者:

基金项目:

国家自然科学基金(61771416)资助项目。


Key Management Method in Mobile Scenarios for Heterogeneous Wireless Sensor Networks
Author:
Affiliation:

1.Electric Power Research Institute, State Grid Xinjiang Electric Power Co., Ltd, Urumqi 830011, China;2.Dispatching Control Center, State Grid Xinjiang Electric Power Co., Ltd, Urumqi 830017, China;3.School of Information Science and Engineering, Xinjiang University, Urumqi 830046, China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
    摘要:

    由于移动无线传感器网络支持节点的移动性,使其面临更加复杂的安全性挑战,很难防御一些极具破坏力的攻击,比如节点复制攻击和女巫攻击等。本文提出了在移动异构无线传感器网络模型下一种安全高效的密钥管理方法。所提方法采用椭圆曲线密码学加密算法实现移动节点位置信息到基站的安全上传,以及基于密钥哈希的消息认证码来实现消息源的身份认证。基站则对收集的移动节点位置信息进行统计分析来协助完成固定节点与移动节点间的身份认证及会话密钥建立。实验结果表明,所提方法在密钥建立过程节省了网络资源,同时可有效防御攻击者发起重放攻击、节点复制攻击和女巫攻击等,增强了网络安全性。

    Abstract:

    Mobile wireless sensor networks (MWSNs) support the mobility of nodes, and face more complex security challenges. It is difficult to prevent attackers from launching some extremely destructive attacks, such as node replication attacks and sybil attacks. This paper proposes a safe and efficient key management method under the mobile heterogeneous wireless sensor network model. The proposed method adopts the elliptic curve cryptography encryption algorithm to realize the safe upload of mobile node location information to the base station, and uses the message authentication code based on key hash to realize the identity authentication of the message source. The base station performs statistical analysis on the collected location information of the mobile node to assist in completing the identity authentication and session key establishment between the fixed node and the mobile node. Experimental results show that the proposed method saves network resources during the key establishment process, and can effectively defend against attackers from launching replay attacks, node replication attacks, and sybil attacks, thus enhancing network security.

    表 3 网络节点分配情况Table 3 Distribution of network nodes
    表 2 不同方法的安全性对比Table 2 Comparison of safety for different methods
    图1 移动场景下网络模型Fig.1 Network model in mobile scenarios
    图2 各方法密钥预存储空间占用对比Fig.2 Comparison of key pre-storage space occupied by each scheme
    图3 各方法FN与MN会话密钥建立的耗时对比Fig.3 Comparison of time-consuming in establishment of FN and MN session keys for each method
    参考文献
    相似文献
    引证文献
引用本文

李峰,李亚平,张志军,解鹏,郭学让,袁二东,祁雷.移动场景下异构无线传感器网络密钥管理方法[J].数据采集与处理,2021,36(5):1020-1029

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
历史
  • 收稿日期:2020-08-25
  • 最后修改日期:2021-07-06
  • 录用日期:
  • 在线发布日期: 2021-10-22