期刊文献+

分簇结构跨层连接网络的随机密钥预分配仿真 被引量:1

Random Key Pre-Distribution Simulation of Clustered Structure Cross-layer Connection Network
在线阅读 下载PDF
导出
摘要 采用当前方法分配网络中的密钥时,不能精准的检测出网络中存在的异常数据,分配密钥所用的时间较长,存在异常数据检测误报率高和密钥分配效率低的问题。提出分簇结构跨层连接网络的随机密钥预分配方法,通过主成分分析法和小波变换方法构建网络正常流量模型,在网络正常流量模型的基础上采用EWMA控制图和Shewart控制图分析网络中存在的残余流量,根据分析结果检测网络中存在的异常数据。去除网络中存在的异常数据后,选择簇首实现分簇,通过基站将密钥分配给簇首、簇首将密钥分配给簇内节点、节点在相同簇内的通信以及不同簇中节点之间的通信实现密钥的预分配。仿真结果表明,所提方法检测网络异常数据的误报率低、密钥分配效率高。 The current methods cannot accurately detect the abnormal data in network during the allocation of keys. Due to high false alarm rate of abnormal data detection and low efficiency of key allocation, this article puts forward a method for pre-allocate the random key in clustered cross-layer connection network with clustering structure. The normal network traffic model was constructed by principal component analysis and wavelet transform. Based on the normal network traffic model, EWMA control chart and Shewart control chart were used to analyze the residual traffic in network. According to the analysis results, the abnormal data in network were detected. After removing the abnormal data in network, the cluster head was selected to realize the clustering. Through the base station, the keys were allocated to the cluster head, and then the cluster head allocated the keys to the nodes within the cluster head. Based on the communication between nodes in the same cluster or different clusters, the key pre-distribution was achieved. Simulation results show that the proposed method has low false alarm rate and high efficiency of key allocation in detecting network abnormal data.
作者 常国锋 CHANG Guo-feng(Xinxiang college,College of Computer and Information Engineering,Henan Xinxiang 453003,China)
出处 《计算机仿真》 北大核心 2019年第11期260-263,267,共5页 Computer Simulation
关键词 分簇结构 随机密钥 分配方法 主成分分析 Clustering structure Random key Allocation method Principal component analysis(PCA)
作者简介 常国锋(1978-),男(汉族),河南濮阳人,硕士,副教授,研究方向:计算机网络,网络安全。
  • 相关文献

参考文献9

二级参考文献71

  • 1刘海涛,黎滨洪,谢勇,戚冬生.并行射线跟踪算法及其在城市电波预测的应用[J].电波科学学报,2004,19(5):581-585. 被引量:17
  • 2李熙涵,邓富国,周宏余.Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger-Horne-Zeilinger States[J].Chinese Physics Letters,2007,24(5):1151-1153. 被引量:14
  • 3DAVII M I., JHN 13 O. Secure data networks for electrical distribution applications[J]. Journal of Modern Power Systemsand lean Energy, 2015, 3(3): 447-455.
  • 4NICANFAR H, JOKAR P, BEZNOSOV K, et al. Efficient authentication and key management mechanisms for smart grid eommunications[J]. IEEE Systems JournaL, 2014, 8(2): 629- 640.
  • 5KAMTO J, QIAN L, FULLER J, et al. Light-weight key distribution and management for advanced metering infrastrueture[C]// GLOBECOM Workshops, December 5-9, 2011, Houston, USA: 5p.
  • 6WU Dapen, ZHOU Chi. Fault-tolerant and scalable key management for smart grid [J]. IEEE Trans on Smart (;rid, 2011, 6(2): 375-381.
  • 7KIM J Y, CHOI H K. An efficient and versatile key management protocol for secure smart grid communications [C]// Wireless Communications and Networking Conference (WCNC), April 1-4, 2012, Shanghai, China: 6p.
  • 8XIA J, WAN Y. Secure key distribution for the smart grid [J]. IEEETranson Srnarl Grid, 2012, 9(3) 1437 1443.
  • 9GOLDWASSER S, MICALI S, RIVEST R 1.. A digital signature scheme secure againsl adaptive chosen message attacks[J]. SIAM Journal on ompeting, 1988, 10(11): 132- 137.
  • 10BELLARE M, ROGAWAY P. A pradigm for designingefficient protocols[C]// 1st ACM Conference on Computer and Communieations Security, November 3-5, 1993, Fairfax, VA, USA: 12p.

共引文献82

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部