무선센서네트워크에서의 하이브리드 키 관리 기법
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 홍만표 | - |
dc.contributor.author | 구안 홍메이 | - |
dc.date.accessioned | 2019-10-21T06:47:15Z | - |
dc.date.available | 2019-10-21T06:47:15Z | - |
dc.date.issued | 2007-02 | - |
dc.identifier.other | 2248 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/handle/2018.oak/16685 | - |
dc.description | 학위논문(석사)--아주대학교 정보통신전문대학원 :정보통신공학과,2007.2 | - |
dc.description.tableofcontents | 1. Introduction = 2 1.1 Related Work = 5 1.1.1 Unique Pairwise Keys for All Pairs = 5 1.1.2 Use of a Trusted Base Station as a KDC = 6 1.1.3 Random Key Chain Pre-distribution Scheme = 7 1.1.4 Random Pairwise Keys Scheme = 9 1.1.5 λ-Secure Key Establishment Schemes = 11 1.1.6 Multispace Key Schemes = 12 1.1.7 Deterministic Key Pre-distribution Schemes = 13 1.2 Main contribution of this paper = 14 2. System and Threat Models = 16 2.1 System Architecture = 16 2.2 Threat model = 19 3 Improved Exclusion Basis Systems (EBS) = 21 3.1 The Original Exclusion Basis Systems = 21 3.2 The Improved Exclusion Basis Systems = 24 4. Description of CHI = 27 4.1 Components and Responsibilities = 27 4.1.1 Base Station = 27 4.1.2 Gateway = 29 4.1.3 Sensor Node = 30 4.2 Key Management Scheme = 31 4.2.1 Pre-distribution = 31 4.2.2 Direct Key Discovery = 32 4.2.3 Path Key Establishment = 32 4.2.4 Addition of New Node and Re-keying = 33 4.2.5 Key Revocation = 35 5. Performance Analysis = 38 5.1 Overhead = 38 5.2 Memory Usage = 39 5.3 Security Analysis = 43 6. Conclusion = 47 Reference = 50 | - |
dc.language.iso | eng | - |
dc.publisher | The Graduate School, Ajou University | - |
dc.rights | 아주대학교 논문은 저작권에 의해 보호받습니다. | - |
dc.title | 무선센서네트워크에서의 하이브리드 키 관리 기법 | - |
dc.title.alternative | Guan, Hong-MeiI | - |
dc.type | Thesis | - |
dc.contributor.affiliation | 아주대학교 정보통신전문대학원 | - |
dc.contributor.alternativeName | Guan, Hong-MeiI | - |
dc.contributor.department | 정보통신전문대학원 정보통신공학과 | - |
dc.date.awarded | 2007. 2 | - |
dc.description.degree | Master | - |
dc.identifier.localId | 565912 | - |
dc.identifier.url | http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000002248 | - |
dc.subject.keyword | sensor network | - |
dc.description.alternativeAbstract | Nowadays, there have been major advances in the development of low power micro-sensor nodes (sensors for short). The emergence of such sensors has led practitioners to envision networking a large set of sensors scattered over a wide area of interest into a wireless sensor network (WSN) for large-scale event monitoring and data collection and filtering The energy-constrained nature of WSN, the absence of the static infrastructure, the use of wireless channels, and the large number of nodes make the task of incorporating security in WSN a challenging problem. Most of the well known security schemes designed for traditional wire-line and wireless networks introduce significant computation and communication overhead and, thus, cannot be readily applied to WSN. In this paper, we present a novel solution to the problem of key management in WSN. Specifically, we propose a lightweight scheme for clustered WSN based on a combinatorial formulation of the group key management problem. Our solution minimizes the energy and memory consumption of the security protocol. We also introduce a novel key assignment scheme for reducing the potential of collusion by factoring the geographic location of nodes in key assignment. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.