HUA Chun,LIAO Xiaoping,HOU Xiang.A Key Management Strategy for Wireless Sensor Networks[J].Journal of Chengdu University of Information Technology,2023,38(04):429-435.[doi:10.16836/j.cnki.jcuit.2023.04.009]
一种适用于无线传感器网络的密钥管理策略
- Title:
- A Key Management Strategy for Wireless Sensor Networks
- 文章编号:
- 2096-1618(2023)04-0429-07
- Keywords:
- WSN; zero trust network; key distribution; key update; dynamic adjustment
- 分类号:
- TN918.91
- 文献标志码:
- A
- 摘要:
- 随着信息技术的快速发展, 数据安全的重要性愈发凸显, 作为数据保护的有效手段, 现代数据加密技术在计算机网络中得到了广泛应用, 其中密钥分发对密钥保护体系有着举足轻重的作用。在无线传感器网络中, 由于节点能量有限, 计算能力偏低等诸多限制条件, 导致传统的基于非对称密钥的密钥分发策略难以直接应用。设计了一种适用于无线传感器网络的密钥管理策略, 借鉴零信任网络思想, 采用对称加密技术进行密钥分发, 能够减少运算复杂性, 降低传感器节点的能量消耗, 同时引用了信任系数动态调整机制, 可以根据无线传感器网络状况动态调整密钥更新周期, 进一步降低能耗, 具有一定的应用价值。
- Abstract:
- With the rapid development of information technology, the importance of data security is becoming more and more prominent. As an effective means of data protection, modern data encryption technology has been widely used in computer networks, among which key distribution plays an important role in key protection system. In wireless sensor networks, the traditional key distribution strategy based on asymmetric key is difficult to be applied directly due to many restrictions, such as limited node energy and low computing ability. This paper proposes a key management strategy suitable for wireless sensor networks. Learning from the idea of zero trust network and using symmetric encryption technology for key distribution, it can reduce the computational complexity and reduce the energy consumption of sensor nodes. At the same time, a dynamic adjustment mechanism of trust coefficient is proposed in this paper, which can dynamically adjust the key update cycle according to the status of wireless sensor networks and further reduce the energy consumption, it is of certain application value to data security.
参考文献/References:
[1] Wu Dapeng, Liu Zhenli, Yang Zhigang, et al.Survivability-Enhanced Virtual Network Embedding Strategy in Virtualized Wireless Sensor Networks[J].Sensors, 2020, 21(1):218-237.
[2] Reiter M K, Franklin M K, Lacy J B, et al.The Omega Key Management Service[J].Journal of Computer Security, 1996, 4(4):267-287.
[3] Challaly, Seba H.Group Key Management Protocols:A Novel Taxonomy[J].International Journal of Information Technology, 2005, 2(1):105-118.
[4] Ready L B, Oden R, Chadwick H S, et al.Development of An Anesthesiology-based Postoperative Pain Management Service[J].The Journal of the American Society of Anesthesiologists, 1988, 68(1):100-106.
[5] Tian Biming, Han Song, Liu Liu, et al.Towards Enhanced Key Management in Multi-phase ZigBee Network Architecture [J].Computer Communications, 2012, 35(5):579-588.
[6] Chandramouli R, Iorga M, Chokhani S.Cryptographic Key Management Issues and Challenges in Cloud Services[J].Secure Cloud Computing, 2014:1-30.
[7] Diffie W.New Direction in Cryptography[J].IEEE Transactions on Information Theory, 1976, 22(6):644-654.
[8] Peikert C.Lattice Cryptography for the Internet[C].Springer. International Workshop on Post-Quantum Cryptography.October 1-3, 2014.Waterloo, ON, Canada.Berlin:Springer, 2014:197-219.
[9] Bos J W, Costello C, Naehrig M, et al.Post-quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem[C].IEEE.2015 IEEE Symposium on Security and Privacy.May 21, 2015, San Jose, California.New Jersey:IEEE, 2015:553-570.
[10] Alkim E, Ducas L, Poppelmann T, et al.Post-quantum Key Exchange-A New Hope[C].USENIX.USENIX Security Symposium, August 10-12, 2016, Austin, TX, Berkeley:USENIX, 2016:327-343.
[11] Kindervag John.Forrester Build Security into Your Network’s DNA:The Zero Trust Network Architecture[EB/OL].https://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA., 2010-11-10.
[12] Nist.Zero Trust Architecture[EB/OL].https://csrc.nist.gov/publications/detail/sp/800-207/archive, 2019-9-23.
[13] Rizvi S, Ryoo J, Liu Y, et al.A Centralized Trust Model Approach for Cloud Computing[C].IEEE.23rd IEEE Wireless and Optical Communication Conference, May 9-10, 2014, Newark, New Jersey, USA.NJ:IEEE, 2014:1-6.
[14] Decusatis C, Liengtiraphan P, Sager A, et al.Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication[C].IEEE.2016 IEEE International Conference on Smart Cloud, November 18-20, 2016, New York, USA.NJ:IEEE, 2016:5-10.
[15] Eidle D, Ni S, Decusatis C, et al.Autonomic Security for Zero Trust Networks[C].IEEE.8rd IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, October 19-21, 2017, New York, USA.NJ:IEEE, 2017:288-293.
[16] Samaniego M, Deters R.Zero-Trust Hierarchical Management in IoT[C].IEEE.2018 IEEE International Congress on Internet of Things, July 2-7, 2018, San Francisco, CA, USA.NJ:IEEE, 2018:88-95.
备注/Memo
收稿日期:2022-09-07