Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Sensors and Actuators》 2007-07
Add to Favorite Get Latest Update

Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks

JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China)  
Broadcast authentication is a very important security service in wireless sensor networks,ordinary sender nodes can broadcast messages to other nodes by using it.Based on the Merkle tree broadcast authentication strategy,a strategy for hierarchical Merkle tree broadcast authentication is proposed,which mainly focuses on the distribution of initial parameters.The new strategy supports large-scale broadcast senders and reduces computation costs,memory consumption and communication overhead effectively.In order to resolve the contradictions between the long-lived senders and the key chain length,a two-level μTESLA is introduced to the hierarchical Merkle tree broadcast authentication strategy and a condition to choose the length of a low-level key chain is proposed.
【Fund】: 教育部博士点基金资助(20050699037)
【CateGory Index】: TP212.9;TN929.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
2 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
3 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
4 PANG Liao-jun1,2,LI Hui-xian3,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2.Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;3.School of Comput.Sci.,Northwestern Polytechnical Univ,Xi'an 710072,China;Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing[J];Chinese Journal of Sensors and Actuators;2008-10
5 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
6 YANG Guang-song1,CHEN Chao-yang1,XIAO Ming-bo2(1.School of Information Engineering,Jimei University,Xiamen 361021,China;2.Department of Communication Engineering,Xiamen University,Xiamen 361005,China);Design of cross-layer security for wireless sensor network's[J];Transducer and Microsystem Technologies;2007-02
7 ZHOU Quan1,ZHOU Xiao-dong2(1.Institute of Information Security,Guangzhou University,Guangzhou 510006,China;2.West Sichuan Drilling Corp,Chengdu 610011,China);Trusted routing protocol based on cluster head for wireless sensor networks[J];Transducer and Microsystem Technologies;2008-10
8 YANG Li-juan,HUANG Dao-chang,LI Yuan-ping(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Research on key management in Wireless Sensor Network[J];Journal of Changsha Communications University;2008-01
9 WANG Gang1,WEN Tao1,2,GUO Quan2,MA Xue-bin1(1.Software Center,Northeastern University,Shenyang 110004,China;2.Department of Computer Science and Technology,Neusoft Information Institute,Dalian 116023,China.);A Cluster-Based Security Protocol in Wireless Sensor Networks[J];Journal of Northeastern University(Natural Science);2009-01
10 Zhang Zhijiang1,2 Zhu Liehuang1 Tang Hong1(1 School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China)(2 The Electronic Technology Institute of Air Force,Beijing 100195,China);Security and authentication scheme for hierarchical wireless sensor networks[J];Journal of Southeast University(Natural Science Edition);2008-S1
China Proceedings of conference Full-text Database 6 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
3 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
4 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
5 Wang Jianqiu1,2 Lang Weimin3 Ji Yinghua1 (1 College of Physics and Communication Electronics, Jiangxi Normal University, Nanchang, 330027, China; 2 College of Electronic and Information Engineering,Wuhan Institute of Technology, Wuhan, 430074, China; 3 PLA Communication Commands Academy, Wuhan, 430010, China);Research on the Security in Wireless Sensor Network[A];[C];2008
6 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved