网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (6): 52-69.doi: 10.11959/j.issn.2096-109x.2022082

• 专题:密码学技术与应用 • 上一篇    下一篇

集群网络密钥管理方案研究综述

刘军, 袁霖, 冯志尚   

  1. 信息工程大学,河南 郑州 450001
  • 修回日期:2022-11-06 出版日期:2022-12-15 发布日期:2023-01-16
  • 作者简介:刘军(1991- ),男,湖南邵阳人,信息工程大学硕士生,主要研究方向为信息安全与密码管理
    袁霖(1981- ),男,河南商丘人,博士,信息工程大学副教授,主要研究方向为信息安全与密码管理
    冯志尚(1996- ),男,河南郑州人,信息工程大学硕士生,主要研究方向为信息安全与密码管理
  • 基金资助:
    国家自然科学基金(61902427)

Survey of key management schemes for cluster networks

Jun LIU, Lin YUAN, Zhishang FENG   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2022-11-06 Online:2022-12-15 Published:2023-01-16
  • Supported by:
    The National Natural Science Foundation of China(61902427)

摘要:

随着人工智能和通信网络技术快速发展,集群智能越来越受到重视,集群网络作为集群智能重要组成部分,信息安全交互问题备受关注,集群密钥管理成为该领域的研究热点。近年来,研究者对集群密钥管理研究的不断深入,提出了很多集群密钥管理方案,为复杂的集群网络体系进行信息安全交互提供了有效解决思路,但缺乏系统性的概括论述。对现有集群密钥管理方案进行了分析和总结,并探讨了集群密钥管理未来研究方向和应用场景。介绍了包括控制层、簇头层、节点层的典型三层集群网络模型,指出集群网络具有数量规模较大、动态拓扑变化、分层分簇异构的网络特性;根据密钥管理策略和集群网络场景,按照网络部署前和网络部署后归纳了集群密钥管理流程,并从安全性、效率、灵活性3方面分析了密钥管理评价指标;重点论述了预分配管理、愈合管理、动态管理3种密钥管理方案,并分析了不同类型方案的基本思路和优缺点,从技术基础、安全优势、灵活优势、效率优势4方面对不同方案性能进行了对比总结;从跨域异构、集群认证、愈合机制、技术融合4方面对集群密钥管理相关的研究热点进行了展望,并探讨了集群密钥管理在泛在物联、全域作战、智慧城市3个未来应用场景中的重要安全作用。

关键词: 集群网络, 密钥管理, 信息安全, 集群认证, 愈合机制

Abstract:

With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction has attracted much attention, and cluster key management has become a research hotspot in network information security.In recent years, many cluster key management schemes have been proposed, which provide effective solutions for information security interaction of complex cluster network systems.The existing cluster key management schemes were analyzed and summarized, and the future research direction and application scenarios were discussed.The typical three-layer cluster network model was introduced, including the control layer, cluster head layer and node layer.The characteristics of cluster network were summarized, such as large number and scale, dynamic topology change, and hierarchical cluster heterogeneity.According to the key management strategy and cluster networking scenarios, the cluster key management process before and after the network deployment was summarized.The key management evaluation index was analyzed from the aspects of security, efficiency, and flexibility.Then, three key management schemes including pre-distribution management, healing management and dynamic management were discussed.Their basic ideas, advantages and disadvantages were analyzed, and their performance from the aspects of techniques, security, flexibility, and efficiency was compared.Besides, the research hotspots related to cluster key management were prospected from cross-domain heterogeneity, cluster authentication, healing mechanism, and technology fusion.The security function of cluster key management in future application scenarios such as ubiquitous IoT, all-domain operation, and smart city was discussed.

Key words: cluster network, key management, information security, cluster authentication, healing mechanism

中图分类号: 

No Suggested Reading articles found!