共查询到3条相似文献,搜索用时 0 毫秒
1.
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually
form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present
a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency
and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating
procedure and is efficient in terms of storage, communication and computation overheads.
Foundation item: the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z455, and 2007AA01Z473). 相似文献
2.
A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network (WSN). In the proposed scheme, broadcast polynomial, generated over finite field Fq based on the secret sharing, was employed to revoke compromised sensor nodes. In order to tolerate key-update message loss, group session keys were generated as one-way hash chain sequence and distributed in advance. The analysis showes that the scheme has better performance in terms of the computation and communication overhead. 相似文献
3.
Recently, the barrier coverage was proposed and received much attention in wireless sensor network (WSN), and the degree of the barrier coverage, one of the critical parameters of WSN, must be re-studied due to the difference between the barrier coverage and blanket coverage. In this paper, we propose two algorithms, namely,local tree based no-way and back (LTNWB) algorithm and sensor minimum cut sets (SMCS) algorithm, for the opened and closed belt regions to determine the degree of the barrier coverage of WSN. Our main objective is to minimize the complexity of these algorithms. For the opened belt region, both algorithms work well, and for the closed belt region, they will still come into existence while some restricted conditions are taken into consideration.Finally, the simulation results demonstrate the feasibility of the proposed algorithms. 相似文献