期刊文献+

门限方案密钥数据库技术在矿井无线传感器网络中的应用研究

Application Research of Technology of Gate-limit Method Key Database in Mine Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 文章详细介绍了应用于军事领域的无线传感器网络门限方案密钥数据库技术,包括无线传感器网络密钥管理机制和门限方案密钥表模型的建立等,并对该技术在煤矿井下的应用进行了可行性研究,指出该技术可用于瓦斯等气体异常地点及人员的定位与报警等。 The paper introduced the technology of gate-limit method key database of wireless sensor networks applied in the martial field, including key managing mechanism and establishment of model of gate-limit method key table. Then it made a feasible research for application of the technology in coal mine underground and pointed out that the technology could be used to locate abnormal place of gas and personnel and alarm.
出处 《工矿自动化》 北大核心 2007年第6期16-19,共4页 Journal Of Mine Automation
关键词 矿井 无线传感器网络 安全 门限方案 密钥数据库 mine, wireless sensor networks, safety, gate-limit method, key database
  • 相关文献

参考文献4

二级参考文献16

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部