通信学报 ›› 2015, Vol. 36 ›› Issue (5): 31-39.doi: 10.11959/j.issn.1000-436x.2015153

• 学术论文 • 上一篇    下一篇

基于分布式密钥共享的UWSN安全分簇方案

仲红1,2,张庆阳1,2,田立超1,2,王良民1,2   

  1. 1 安徽大学 信息保障技术协同创新中心,安徽 合肥 230601
    2 安徽大学 计算机科学与技术学院,安徽 合肥 230601
  • 出版日期:2015-05-20 发布日期:2015-07-17
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;安徽省科技计划基金资助项目

Distributed key sharing based scheme for security clustering in unattended wireless sensor network

HONGHong Z1,2,HANGQing-yang Z1,2,IANLi-chao T1,2,ANGLiang-min W1,2   

  1. 1 Center of Information Support and Assurance Research,Anhui University,Hefei 230601,China
    2 School of Computer Science and Technology,Anhui University,Hefei 230601,China
  • Online:2015-05-20 Published:2015-07-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Science and Technology Plan of Anhui Province

摘要:

针对无照料的无线传感网(UWSN,unattended wireless sensor network)收集效率和安全问题,提出一种安全的 UWSN 分簇方案,实现了一种三角形网格图的网络拓扑分簇算法,并可完成簇头对移动节点的认证。该方案利用三角形的性质提高了网络的连通度,折中数据收集效率与能耗;将分布式密钥共享方案与分簇算法无缝结合,在网络中高效地搜索移动节点公钥信息,从而在本地不存有对应公钥信息的情况下验证签名信息。实验结果表明,该算法在节点密度越大的情况下分簇越趋近于正三角形网格图,且分簇后的网络对于低于20%节点变节有95%以上概率抵御攻击。

关键词: 无照料的无线传感网, 移动汇聚节点, 分簇算法, 分布式密钥共享

Abstract:

For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.

Key words: unattended wireless sensor network, mobile sinks, clustering algorithm, distributed key sharing

No Suggested Reading articles found!