PDF下载 分享
[1]华 春,廖小平,侯 翔.一种适用于无线传感器网络的密钥管理策略[J].成都信息工程大学学报,2023,38(04):429-435.[doi:10.16836/j.cnki.jcuit.2023.04.009]
 HUA Chun,LIAO Xiaoping,HOU Xiang.A Key Management Strategy for Wireless Sensor Networks[J].Journal of Chengdu University of Information Technology,2023,38(04):429-435.[doi:10.16836/j.cnki.jcuit.2023.04.009]
点击复制

一种适用于无线传感器网络的密钥管理策略

参考文献/References:

[1] Wu Dapeng, Liu Zhenli, Yang Zhigang, et al.Survivability-Enhanced Virtual Network Embedding Strategy in Virtualized Wireless Sensor Networks[J].Sensors, 2020, 21(1):218-237.
[2] Reiter M K, Franklin M K, Lacy J B, et al.The Omega Key Management Service[J].Journal of Computer Security, 1996, 4(4):267-287.
[3] Challaly, Seba H.Group Key Management Protocols:A Novel Taxonomy[J].International Journal of Information Technology, 2005, 2(1):105-118.
[4] Ready L B, Oden R, Chadwick H S, et al.Development of An Anesthesiology-based Postoperative Pain Management Service[J].The Journal of the American Society of Anesthesiologists, 1988, 68(1):100-106.
[5] Tian Biming, Han Song, Liu Liu, et al.Towards Enhanced Key Management in Multi-phase ZigBee Network Architecture [J].Computer Communications, 2012, 35(5):579-588.
[6] Chandramouli R, Iorga M, Chokhani S.Cryptographic Key Management Issues and Challenges in Cloud Services[J].Secure Cloud Computing, 2014:1-30.
[7] Diffie W.New Direction in Cryptography[J].IEEE Transactions on Information Theory, 1976, 22(6):644-654.
[8] Peikert C.Lattice Cryptography for the Internet[C].Springer. International Workshop on Post-Quantum Cryptography.October 1-3, 2014.Waterloo, ON, Canada.Berlin:Springer, 2014:197-219.
[9] Bos J W, Costello C, Naehrig M, et al.Post-quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem[C].IEEE.2015 IEEE Symposium on Security and Privacy.May 21, 2015, San Jose, California.New Jersey:IEEE, 2015:553-570.
[10] Alkim E, Ducas L, Poppelmann T, et al.Post-quantum Key Exchange-A New Hope[C].USENIX.USENIX Security Symposium, August 10-12, 2016, Austin, TX, Berkeley:USENIX, 2016:327-343.
[11] Kindervag John.Forrester Build Security into Your Network’s DNA:The Zero Trust Network Architecture[EB/OL].https://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA., 2010-11-10.
[12] Nist.Zero Trust Architecture[EB/OL].https://csrc.nist.gov/publications/detail/sp/800-207/archive, 2019-9-23.
[13] Rizvi S, Ryoo J, Liu Y, et al.A Centralized Trust Model Approach for Cloud Computing[C].IEEE.23rd IEEE Wireless and Optical Communication Conference, May 9-10, 2014, Newark, New Jersey, USA.NJ:IEEE, 2014:1-6.
[14] Decusatis C, Liengtiraphan P, Sager A, et al.Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication[C].IEEE.2016 IEEE International Conference on Smart Cloud, November 18-20, 2016, New York, USA.NJ:IEEE, 2016:5-10.
[15] Eidle D, Ni S, Decusatis C, et al.Autonomic Security for Zero Trust Networks[C].IEEE.8rd IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, October 19-21, 2017, New York, USA.NJ:IEEE, 2017:288-293.
[16] Samaniego M, Deters R.Zero-Trust Hierarchical Management in IoT[C].IEEE.2018 IEEE International Congress on Internet of Things, July 2-7, 2018, San Francisco, CA, USA.NJ:IEEE, 2018:88-95.

备注/Memo

收稿日期:2022-09-07

更新日期/Last Update: 2023-07-10