问题描述:
英语翻译
We describe LEAP (Localized Encryption and Authentication
Protocol),a key management protocol for sensor networks
that is designed to support in-network processing,
while at the same time restricting the security impact of a
node compromise to the immediate network neighborhood
of the compromised node.The design of the protocol is
motivated by the observation that different types of messages
exchanged between sensor nodes have different security
requirements,and that a single keying mechanism is not
suitable for meeting these different security requirements.
LEAP supports the establishment of four types of keys for
each sensor node – an individual key shared with the base
station,a pairwise key shared with another sensor node,a
cluster key shared with multiple neighboring nodes,and a
group key that is shared by all the nodes in the network.
The protocol used for establishing and updating these keys
is communication- and energy-efficient,and minimizes the
involvement of the base station.LEAP also includes an
efficient protocol for local broadcast authentication based
on the use of one-way key chains.A salient feature of
the authentication protocol is that it supports source authentication
without precluding in-network processing.Our
performance analysis shows that LEAP is very efficient in
computation,communication,and storage.We analyze the
security of LEAP under various attack models and show
that LEAP is very effective in defending against many sophisticated
attacks such as HELLO Flood attack,Sybil attack,
and Wormhole attack.A prototype implementation of
LEAP in a sensor network testbed is also reported.
We describe LEAP (Localized Encryption and Authentication
Protocol),a key management protocol for sensor networks
that is designed to support in-network processing,
while at the same time restricting the security impact of a
node compromise to the immediate network neighborhood
of the compromised node.The design of the protocol is
motivated by the observation that different types of messages
exchanged between sensor nodes have different security
requirements,and that a single keying mechanism is not
suitable for meeting these different security requirements.
LEAP supports the establishment of four types of keys for
each sensor node – an individual key shared with the base
station,a pairwise key shared with another sensor node,a
cluster key shared with multiple neighboring nodes,and a
group key that is shared by all the nodes in the network.
The protocol used for establishing and updating these keys
is communication- and energy-efficient,and minimizes the
involvement of the base station.LEAP also includes an
efficient protocol for local broadcast authentication based
on the use of one-way key chains.A salient feature of
the authentication protocol is that it supports source authentication
without precluding in-network processing.Our
performance analysis shows that LEAP is very efficient in
computation,communication,and storage.We analyze the
security of LEAP under various attack models and show
that LEAP is very effective in defending against many sophisticated
attacks such as HELLO Flood attack,Sybil attack,
and Wormhole attack.A prototype implementation of
LEAP in a sensor network testbed is also reported.
问题解答:
我来补答展开全文阅读