Key management scheme for wireless sensor networks based on quantum cryptography
CHEN Xiaofeng, LIN Song
1 School of Electronic Information Science, Fujian Jiangxia University, Fuzhou 350108, China; 2 Smart Home Information Collection and Processing IOT Lab of Fujian, Fuzhou 350108, China; 3 School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, China
[1] Su Jinshu,Guo Wenzhong,Yu Chaolong,et al.Fault-tolerance clustering algorithm with load-balance aware in wireless sensor network[J]. Chinese Journal of Computers(计算机学报),2014,37(2): 446-456(in Chinese). [2] Wang Qiuhua,Chen Huifang,Xie Lei, et al.Improved random key pre-distribution scheme for wireless sensor networks[J].Chinese Journal of Sensors and Actuators(传感技术学报),2010,23(10): 1494-1500(in Chinese). [3] Yu Ding,Kun Mu. A multi-key-pool key pre-distribution scheme for wireless sensor networks[C]. IEEE China,2011: 190-195. [4] Tanuja R,Arudi S P,Manjula S H, et al. TKP: Three level key pre-distribution with mobile sinks for wireless sensor networks[C].IEEE International Conference on Signal Processing,2015: 1-5. [5] Shi Linyao,Wu Meng.Survey of distributed key distribution on WSN[J].Video Engineering(电视技术), 2015, 39(3): 77-80(in Chinese). [6] Stallings W.Cryptography and Network Security- Principles and Practices(密码学与网络安全-原理与实践)[M].Transl. by Meng Qingshu, et al. Beijing: Publishing House of Electronics Industry, 2006(in Chinese). [7] Tang Lili,Gao Zhonghe.Key management scheme based on symmetric polynomial for wireless senson network[J].Communications Technology(通信技术), 2012, 45(12): 71-73(in Chinese). [8] Chen Chinling, Tsai Yuting,Castiglione A, et al. Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks[J]. Computer Science and Information Systems,2013,10(2): 589-609. [9] Chang Xinfeng,SUN Yanan. A key pre-distribution scheme based on polynomial for wireless sensor networks[J].Computer and Digital Engineering,2014,42(11): 2117-2201. [10] Yang Jianli,Liao Wei,Yuan Zhimin.Survey of security authentication schema for wireless sensor networks[J]. Application Research of Computers(计算机应用研究),2015,32(2): 503-506(in Chinese). [11]Zhu S,Setia S,Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]. Proceeding of the 10th ACM Conference on Computer and Communications Security, Washington: ACM,2003: 62-72. [12] Oliveira L B,Aranha D F,Gouvea P L, et al. TinyPBC:Pairings for authenticated identity-based non-interactive key distribution in sensor networks[J].Computer Communications,2009,34(3):485-493. [13] Wang Liqin,Yang Xiaoyun. Pairings-based key management and authentication schema for WSN[J]. Application Research of Computers(计算机应用研究),2009,26(11):4302-4305(in Chinese). [14] Zhao Yuehua,Huang Shumei. WSN key negotiation and authentication protocol based on bilinear pairings[J]. Computer Engineering(计算机工程),2012,38(9):121-124 (in Chinese). [15]Li Ming. Novel two-party authenticated key agreement protocol in wireless sensor network [J]. Computer Engineering and Applications(计算机工程与应用),2016,52(3):100-102(in Chinese). [16]Shang L,Chu H L,Wang Y,et al. Research progress of hollow-core Bragg fibers and their applications in sensing[J]. Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(2): 129-139(in Chinese). [17]Zhou J D, How G,Wu S J. Controlled teleportation of an arbitrary multi-qubit state in a general form with d-dimensional Greenberger-Horne-Zeilinger states[J]. Chinese Physics Letters, 2007, 24:1151-1153. [18]Shan Xiaolan,Zhang Huazhong,Yu Pengcheng. Research on key management for wireless sensor network on clustering[J]. Computer Engineering and Design(计算机工程与设计),2007,28(20):4897?4899(in Chinese).