劉軍,袁霖,馮志尚
集群網(wǎng)絡(luò)密鑰管理方案研究綜述
劉軍,袁霖,馮志尚
(信息工程大學(xué),河南 鄭州 450001)
隨著人工智能和通信網(wǎng)絡(luò)技術(shù)快速發(fā)展,集群智能越來(lái)越受到重視,集群網(wǎng)絡(luò)作為集群智能重要組成部分,信息安全交互問(wèn)題備受關(guān)注,集群密鑰管理成為該領(lǐng)域的研究熱點(diǎn)。近年來(lái),研究者對(duì)集群密鑰管理研究的不斷深入,提出了很多集群密鑰管理方案,為復(fù)雜的集群網(wǎng)絡(luò)體系進(jìn)行信息安全交互提供了有效解決思路,但缺乏系統(tǒng)性的概括論述。對(duì)現(xiàn)有集群密鑰管理方案進(jìn)行了分析和總結(jié),并探討了集群密鑰管理未來(lái)研究方向和應(yīng)用場(chǎng)景。介紹了包括控制層、簇頭層、節(jié)點(diǎn)層的典型三層集群網(wǎng)絡(luò)模型,指出集群網(wǎng)絡(luò)具有數(shù)量規(guī)模較大、動(dòng)態(tài)拓?fù)渥兓⒎謱臃执禺悩?gòu)的網(wǎng)絡(luò)特性;根據(jù)密鑰管理策略和集群網(wǎng)絡(luò)場(chǎng)景,按照網(wǎng)絡(luò)部署前和網(wǎng)絡(luò)部署后歸納了集群密鑰管理流程,并從安全性、效率、靈活性3方面分析了密鑰管理評(píng)價(jià)指標(biāo);重點(diǎn)論述了預(yù)分配管理、愈合管理、動(dòng)態(tài)管理3種密鑰管理方案,并分析了不同類型方案的基本思路和優(yōu)缺點(diǎn),從技術(shù)基礎(chǔ)、安全優(yōu)勢(shì)、靈活優(yōu)勢(shì)、效率優(yōu)勢(shì)4方面對(duì)不同方案性能進(jìn)行了對(duì)比總結(jié);從跨域異構(gòu)、集群認(rèn)證、愈合機(jī)制、技術(shù)融合4方面對(duì)集群密鑰管理相關(guān)的研究熱點(diǎn)進(jìn)行了展望,并探討了集群密鑰管理在泛在物聯(lián)、全域作戰(zhàn)、智慧城市3個(gè)未來(lái)應(yīng)用場(chǎng)景中的重要安全作用。
集群網(wǎng)絡(luò);密鑰管理;信息安全;集群認(rèn)證;愈合機(jī)制
集群智能(swarm intelligence)是指簡(jiǎn)單個(gè)體通過(guò)相互協(xié)作表現(xiàn)出來(lái)集群智能行為,最早源于法國(guó)生物學(xué)家Grassé對(duì)蟻群的出現(xiàn)、調(diào)節(jié)和控制機(jī)制的研究[1],蟻群個(gè)體通過(guò)相互合作完成復(fù)雜工作所表現(xiàn)的行為是集群智能雛形。集群智能系統(tǒng)通常指多個(gè)智能體(agent)組建集群網(wǎng)絡(luò)、進(jìn)行信息交互,智能完成多樣性的復(fù)雜任務(wù),具有自組織、無(wú)中心、高魯棒性等特點(diǎn)[2]。集群網(wǎng)絡(luò)作為集群智能系統(tǒng)的神經(jīng)中樞,信息交互功能是確保集群協(xié)作的前提和基礎(chǔ),集群網(wǎng)絡(luò)通常采用無(wú)線方式進(jìn)行信息傳輸,具有與生俱來(lái)的廣播(組播)通信特性,極易受到攻擊者的攻擊,信息安全與保密問(wèn)題日益凸顯。
“一切秘密寓于密鑰”,在網(wǎng)絡(luò)安全管理中,密鑰是保護(hù)網(wǎng)絡(luò)和信息安全的重要保證,安全作用不言而喻,一般來(lái)講,密鑰管理指密鑰產(chǎn)生到銷毀全過(guò)程進(jìn)行的管理,是網(wǎng)絡(luò)安全的關(guān)鍵技術(shù),包括在整個(gè)生命周期對(duì)密鑰及其相關(guān)信息和活動(dòng)實(shí)施有效影響的所有活動(dòng)。廣義來(lái)講包括行政管理和技術(shù)管理,狹義來(lái)講主要指技術(shù)管理,包括密鑰生成、存儲(chǔ)、分配、協(xié)商、使用、更新、備份和恢復(fù)、撤銷和銷毀等過(guò)程[3]。本文主要從狹義上,也就是技術(shù)角度分析密鑰管理。一直以來(lái),國(guó)內(nèi)外對(duì)密鑰管理的技術(shù)研究比較重視,在密鑰管理方案的研究方面取得了大量成果,He等[4]、Barskar等[5]、Singh等[6]、Yousefpoor等[7]、Parthasarathi等[8]、Nithya等[9]對(duì)現(xiàn)有密鑰管理方案成果進(jìn)行了綜述。近年來(lái),隨著物聯(lián)網(wǎng)、車聯(lián)網(wǎng)、無(wú)人機(jī)集群技術(shù)快速發(fā)展,集群網(wǎng)絡(luò)安全問(wèn)題日益突出,面向集群網(wǎng)絡(luò)的密鑰管理成為研究熱點(diǎn)。本文梳理總結(jié)了有關(guān)集群網(wǎng)絡(luò)密鑰管理研究成果,歸納集群網(wǎng)絡(luò)模型和網(wǎng)絡(luò)特性,分析集群網(wǎng)絡(luò)的密鑰管理性能指標(biāo)、步驟流程,總結(jié)對(duì)比了不同集群網(wǎng)絡(luò)密鑰管理方案優(yōu)缺點(diǎn),結(jié)合人工智能、區(qū)塊鏈等新興技術(shù)對(duì)集群網(wǎng)絡(luò)密鑰管理的應(yīng)用前景和未來(lái)研究方向進(jìn)行總結(jié)展望。
集群網(wǎng)絡(luò)作為集群智能的重要組成部分,網(wǎng)絡(luò)模型通常是由一個(gè)或者多個(gè)靜態(tài)(或動(dòng)態(tài))簇組組成的分層體系結(jié)構(gòu)[10]。分層的集群網(wǎng)絡(luò)模型便于進(jìn)行節(jié)點(diǎn)管理,優(yōu)化各級(jí)負(fù)載,增強(qiáng)網(wǎng)絡(luò)可擴(kuò)展性,有效減少通信開(kāi)銷[11]。目前已廣泛應(yīng)用于衛(wèi)星集群[12]、無(wú)人機(jī)集群[13]、車輛集群[14]、傳感器集群[15]等應(yīng)用場(chǎng)景。上述應(yīng)用場(chǎng)景中典型的集群網(wǎng)絡(luò)模型如圖1所示。
1) 控制層(control layer):主要由基站(BS,base station)等控制節(jié)點(diǎn)組成,是集群網(wǎng)絡(luò)的頂層,負(fù)責(zé)對(duì)集群網(wǎng)絡(luò)內(nèi)節(jié)點(diǎn)的控制管理,接收節(jié)點(diǎn)傳輸?shù)男畔?shù)據(jù),發(fā)送控制命令,一般在密鑰管理中擔(dān)任密鑰分發(fā)中心(KDC,key distribution center)角色,地位處于最高級(jí)別。
2) 簇頭層(cluster head layer):由集群網(wǎng)絡(luò)中擔(dān)任簇頭(CH,cluster head)的節(jié)點(diǎn)組成,負(fù)責(zé)中繼信息數(shù)據(jù)和控制命令,對(duì)成員節(jié)點(diǎn)進(jìn)行控制管理,接收成員節(jié)點(diǎn)數(shù)據(jù)并進(jìn)行融合處理,再傳輸給控制層,減少通信開(kāi)銷,密鑰管理中往往擔(dān)任密鑰組管理者(GM,group manager),CH節(jié)點(diǎn)性能、資源較好。
3) 節(jié)點(diǎn)層(node layer):由簇內(nèi)的簇成員(CM,cluster member)節(jié)點(diǎn)組成,集群網(wǎng)絡(luò)中底層的應(yīng)用節(jié)點(diǎn)作為網(wǎng)絡(luò)基本單元,負(fù)責(zé)執(zhí)行具體任務(wù),通過(guò)節(jié)點(diǎn)之間信息交互達(dá)到數(shù)據(jù)共享,CM節(jié)點(diǎn)資源和性能相對(duì)較差。
圖1 典型的集群網(wǎng)絡(luò)模型
Figure 1 Typical cluster network model
集群網(wǎng)絡(luò)在網(wǎng)絡(luò)結(jié)構(gòu)上主要表現(xiàn)為數(shù)量規(guī)模較大、動(dòng)態(tài)拓?fù)渥兓?、分層分簇異?gòu)3個(gè)方面。
1) 數(shù)量規(guī)模較大。集群網(wǎng)絡(luò)往往包含大量的節(jié)點(diǎn),其數(shù)量規(guī)模相對(duì)普通網(wǎng)絡(luò)大很多。
2) 動(dòng)態(tài)拓?fù)渥兓?。集群網(wǎng)絡(luò)通常采取無(wú)線方式進(jìn)行通信,拓?fù)湟资艿酵獠凯h(huán)境影響,進(jìn)而發(fā)生變化。
3) 分層分簇異構(gòu)。具有較多異構(gòu)節(jié)點(diǎn),中心節(jié)點(diǎn)性能有限,往往需要采用分層分簇結(jié)構(gòu)分化節(jié)點(diǎn)承擔(dān)的各類負(fù)載和開(kāi)銷。
結(jié)合集群網(wǎng)絡(luò)應(yīng)用場(chǎng)景和密鑰管理策略,根據(jù)Wang等[16]提出的密鑰更新流程,歸納了集群密鑰管理流程,如圖2所示,主要包括密鑰預(yù)分配、密鑰生成(建立通信密鑰)、密鑰更新與分發(fā)、密鑰愈合(恢復(fù))。
1) 密鑰預(yù)分配:主要在系統(tǒng)初始化階段進(jìn)行,也就是網(wǎng)絡(luò)部署前,KDC從生成的密鑰管理池中,選取部分密鑰分發(fā)至節(jié)點(diǎn),并為節(jié)點(diǎn)預(yù)置密鑰材料用于生成密鑰的過(guò)程。
2) 密鑰生成:建立通信密鑰是密鑰管理的基本問(wèn)題。集群網(wǎng)絡(luò)需要建立多種密鑰進(jìn)行通信,包括BS-CH、CH-CH、CH-CM、CM-CM通信密鑰,需要考慮密鑰隨機(jī)性、強(qiáng)度和空間等問(wèn)題,確保密鑰安全性。
3) 密鑰更新:會(huì)話超過(guò)設(shè)定周期或集群網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu)變化,包括節(jié)點(diǎn)加入、節(jié)點(diǎn)退出、簇組合并、簇組分裂,為避免密鑰泄露,需要進(jìn)行密鑰更新操作。
4) 密鑰分發(fā):密鑰生成(更新)到密鑰使用的過(guò)程,KDC通過(guò)安全通道對(duì)已經(jīng)生成(或更新)的密鑰進(jìn)行分發(fā)管理,通過(guò)廣播或組播方式分發(fā)至CH節(jié)點(diǎn)和CM節(jié)點(diǎn),建立安全通信鏈路。
5) 密鑰愈合(恢復(fù)):在部分動(dòng)態(tài)無(wú)線網(wǎng)絡(luò)中,容易遭受壓制攻擊(如電磁干擾)導(dǎo)致通信中斷,丟失密鑰更新數(shù)據(jù)包,通信恢復(fù)后需要愈合恢復(fù)密鑰,確保后續(xù)建立安全通信,增強(qiáng)網(wǎng)絡(luò)魯棒性。
密鑰管理指通信各方之間建立、分發(fā)、更新和維護(hù)密鑰的程序和技術(shù),評(píng)價(jià)指標(biāo)包括安全性、效率和靈活性3個(gè)方面[17]。
1) 安全性。包括抗毀性、抗共謀攻擊、抗竊聽(tīng)攻擊、前向和后向安全性、節(jié)點(diǎn)撤銷能力等??箽灾傅钟徊东@節(jié)點(diǎn)的攻擊能力,防止攻擊者利用捕獲節(jié)點(diǎn)對(duì)密鑰進(jìn)行破解,有時(shí)也稱抗捕獲攻擊能力;抗共謀攻擊指阻止部分妥協(xié)節(jié)點(diǎn)通過(guò)共謀,利用自身存儲(chǔ)的信息協(xié)作泄露密鑰;抗竊聽(tīng)攻擊指防止攻擊者利用密鑰管理過(guò)程中傳輸?shù)男畔⑵平饷荑€;前向安全性防止使用舊的密鑰對(duì)新加密的消息進(jìn)行解密,后向安全性防止使用新密鑰對(duì)以前加密的消息進(jìn)行解密[4]。節(jié)點(diǎn)撤銷能力指被撤銷的節(jié)點(diǎn)不能計(jì)算當(dāng)前時(shí)間段密鑰。
2) 效率。包括密鑰管理所需要的存儲(chǔ)、通信、計(jì)算等各類開(kāi)銷指標(biāo)。存儲(chǔ)開(kāi)銷指存儲(chǔ)密鑰材料和密鑰所需占用的內(nèi)存空間;通信開(kāi)銷指密鑰生成、分發(fā)、更新和維護(hù)過(guò)程中需要傳輸?shù)男畔⒋笮『蛿?shù)量;計(jì)算開(kāi)銷指密鑰管理過(guò)程中進(jìn)行相關(guān)運(yùn)算和操作的計(jì)算復(fù)雜度;能量消耗指密鑰管理過(guò)程中,密鑰管理消息發(fā)送、接收以及密鑰計(jì)算過(guò)程中所消耗的能量。
圖2 集群密鑰管理流程
Figure 2 Cluster key management process
3) 靈活性。包括密鑰連通性、可拓展性和可伸縮性。連通性指任意需要通信的雙方建立共享密鑰的概率;可拓展性指密鑰管理方案支持的最大網(wǎng)絡(luò)規(guī)模數(shù)量;可伸縮性指在節(jié)點(diǎn)加入或離開(kāi)時(shí)能夠進(jìn)行密鑰更新的特性。
近年來(lái),對(duì)集群網(wǎng)絡(luò)密鑰管理的研究不斷深入,很多有關(guān)集群的密鑰管理方案被提出,考慮集群網(wǎng)絡(luò)結(jié)構(gòu)特性,多數(shù)使用的是層次式的混合密鑰管理方案,本文根據(jù)集群密鑰管理流程,針對(duì)網(wǎng)絡(luò)部署預(yù)分配降低計(jì)算和通信開(kāi)銷、網(wǎng)絡(luò)部署后通信出現(xiàn)中斷和通信拓?fù)渥兓?方面的問(wèn)題,從大量文獻(xiàn)歸納總結(jié)了3種密鑰管理策略:預(yù)分配管理方案、愈合管理方案和動(dòng)態(tài)管理方案。
密鑰預(yù)分配主要指在部署網(wǎng)絡(luò)時(shí)對(duì)密鑰及相關(guān)參數(shù)進(jìn)行預(yù)分配。Blom等[18]提出基于有限域上對(duì)稱矩陣的密鑰預(yù)分配方案,Blundo等[19]在Blom等基礎(chǔ)上提出基于對(duì)稱多項(xiàng)式的密鑰預(yù)分配方案;Eschenauer等[20]提出了經(jīng)典隨機(jī)密鑰預(yù)分配E-G方案;Chan等[21]對(duì)E-G方案進(jìn)行了改進(jìn),增強(qiáng)網(wǎng)絡(luò)抗毀性,提出了q-composite的密鑰預(yù)分配方案;Du等[22]結(jié)合Blom和E-G兩種方案,提出了多密鑰空間預(yù)分配方案(MKPS,multiple- space key pre-distribution scheme);Liu等[23]提出了基于部署信息的密鑰預(yù)分配管理方案;Zhu等[24]提出了經(jīng)典的分層分組LEAP+預(yù)分配密鑰管理方案;經(jīng)過(guò)學(xué)者不斷研究和探索,近年來(lái)出現(xiàn)了較多與集群網(wǎng)絡(luò)有關(guān)的密鑰預(yù)分配方案。
圖3 六邊形分簇結(jié)構(gòu)
Figure 3 Hexagonal cluster structure
表1 密鑰預(yù)分配管理方案性能比較
綜上所述,表1對(duì)本節(jié)論述的密鑰預(yù)分配管理方案性能進(jìn)行了總結(jié)比較。
目前無(wú)線通信網(wǎng)絡(luò)不穩(wěn)定,在實(shí)際應(yīng)用中,通信受距離、地形、電磁環(huán)境等因素影響,容易出現(xiàn)通信中斷情況,密鑰更新過(guò)程可能會(huì)出現(xiàn)數(shù)據(jù)包丟失,致使密鑰更新不及時(shí)影響后續(xù)通信,因此,在密鑰管理過(guò)程中需要考慮到如何恢復(fù)密鑰,簡(jiǎn)單的辦法可以通過(guò)請(qǐng)求重新傳輸數(shù)據(jù),但請(qǐng)求和重新傳輸均會(huì)造成較大的通信開(kāi)銷[35],因此,在密鑰管理中需要引入愈合策略,通過(guò)自愈或互愈方式,抵抗丟包影響,減少網(wǎng)絡(luò)流量,防止流量分析攻擊,達(dá)到安全恢復(fù)密鑰的目的。
愈合策略是在某個(gè)階段數(shù)據(jù)包丟失,無(wú)須向KDC或GM發(fā)送請(qǐng)求重傳密鑰更新消息,有效降低通信負(fù)載,提高密鑰管理效率。基于Shamir[36]秘密共享思想,Staddon等[37]首次提出自愈機(jī)制,為了解決通信網(wǎng)絡(luò)不可靠的數(shù)據(jù)包丟失情況,通過(guò)兩個(gè)多項(xiàng)式構(gòu)造會(huì)話密鑰,設(shè)計(jì)了具有撤銷功能的非交互式自愈密鑰管理方案,解決了不可靠通信或有損網(wǎng)絡(luò)中,離線用戶建立組密鑰的問(wèn)題,但存儲(chǔ)和計(jì)算開(kāi)銷較大;Liu等[38]提出了改進(jìn)的密鑰自愈方案,對(duì)掩碼公式進(jìn)行優(yōu)化,進(jìn)而降低了存儲(chǔ)和通信開(kāi)銷,但容易受到用戶重新加入共謀攻擊;經(jīng)過(guò)不斷優(yōu)化發(fā)展,后續(xù)提出了多種自愈方案:基于多項(xiàng)式[39-41]、基于矢量空間[42-43]、基于哈希鏈[44-45]、基于雙線性配對(duì)[46]、基于指數(shù)[47]等。但如果通信中斷時(shí)間過(guò)長(zhǎng),會(huì)導(dǎo)致丟失的廣播消息數(shù)據(jù)較多,超過(guò)滑動(dòng)窗口大小時(shí)間,無(wú)法通過(guò)自愈策略恢復(fù)密鑰,為保證密鑰愈合的實(shí)時(shí)性,需要對(duì)方案進(jìn)行優(yōu)化,通過(guò)借助鄰居節(jié)點(diǎn)來(lái)愈合密鑰。Tian等[48]基于雙線性對(duì)實(shí)現(xiàn)了互愈策略,借助鄰居節(jié)點(diǎn)愈合密鑰,但計(jì)算開(kāi)銷較大;Agrawal等[49]通過(guò)引入密鑰確認(rèn)和安全節(jié)點(diǎn)定位等功能降低了成本開(kāi)銷,提高了安全性。近年來(lái),隨著集群網(wǎng)絡(luò)群組結(jié)構(gòu)研究,簇組內(nèi)廣泛應(yīng)用愈合管理策略,極大提高了網(wǎng)絡(luò)的魯棒性。
綜上所述,表2對(duì)本節(jié)論述的密鑰愈合管理方案的性能進(jìn)行了總結(jié)比較。
集群網(wǎng)絡(luò)經(jīng)常會(huì)出現(xiàn)節(jié)點(diǎn)加入、退出等頻繁操作,導(dǎo)致集群網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu)變化,需要對(duì)密鑰進(jìn)行動(dòng)態(tài)管理,周期性或基于網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu)變化進(jìn)行更新,能夠提高網(wǎng)絡(luò)安全和延長(zhǎng)網(wǎng)絡(luò)生命周期[7, 60]。Younis等[61]針對(duì)大規(guī)模集群網(wǎng)絡(luò)提出了一種基于排他系統(tǒng)(EBS)的輕量級(jí)密鑰管理方案(SHELL方案);Eltoweissy等[62]對(duì)SHELL方案進(jìn)行改進(jìn)提出了LOCK方案,使用兩層 EBS 對(duì)密鑰進(jìn)行動(dòng)態(tài)管理,減少集群密鑰更新的時(shí)間時(shí)延和能量消耗;Divya等[63]提出一種基于漢明距離的密鑰動(dòng)態(tài)管理方案,防止節(jié)點(diǎn)共謀攻擊;Zhang等[64]、Guo等[65]和關(guān)志濤等[66]提出了基于多項(xiàng)式的密鑰動(dòng)態(tài)管理方案,在降低各類成本同時(shí)提高網(wǎng)絡(luò)安全性能。下面重點(diǎn)論述近年來(lái)有關(guān)集群網(wǎng)絡(luò)的密鑰動(dòng)態(tài)管理方案。
表2 密鑰愈合管理方案性能比較
綜上,表3對(duì)本節(jié)論述的密鑰動(dòng)態(tài)管理方案的性能進(jìn)行了總結(jié)比較。
相對(duì)傳統(tǒng)密鑰管理方案,集群網(wǎng)絡(luò)技術(shù)快速發(fā)展對(duì)密鑰管理提出了更高要求和更大挑戰(zhàn)。隨著集群網(wǎng)絡(luò)大量應(yīng)用到實(shí)踐中,安全問(wèn)題日益凸顯,高效適用的密鑰管理方案需求更為迫切,近年來(lái),學(xué)術(shù)界結(jié)合各種前沿技術(shù)探討在不同應(yīng)用場(chǎng)景下的密鑰管理方案。本文綜述了預(yù)分配、愈合和動(dòng)態(tài)3種策略的密鑰管理方案研究進(jìn)展,下面歸納集群密鑰管理相關(guān)研究熱點(diǎn)。
(1)跨域異構(gòu)
隨著通信網(wǎng)絡(luò)發(fā)展和完善,逐漸將陸地、海洋、空中和太空多維度連接成空天地一體化網(wǎng)絡(luò)(SAGIN,space-air-ground integrated network),SAGIN擁有大量異構(gòu)網(wǎng)絡(luò)節(jié)點(diǎn),如衛(wèi)星、無(wú)人機(jī)、高空平臺(tái)和地面基站[76]。衛(wèi)星節(jié)點(diǎn)、空中節(jié)點(diǎn)、地面節(jié)點(diǎn)需要實(shí)現(xiàn)跨域進(jìn)行信息交互,且空域、地域往往由不同的網(wǎng)絡(luò)異構(gòu)設(shè)備組成;節(jié)點(diǎn)的硬件配件、資源性能、通信帶寬不同,導(dǎo)致計(jì)算、通信、存儲(chǔ)性能不同[77]。在跨域異構(gòu)的天地一體化網(wǎng)絡(luò)應(yīng)用場(chǎng)景下,衛(wèi)星節(jié)點(diǎn)資源性能受限、通信時(shí)延長(zhǎng),近空飛行節(jié)點(diǎn)網(wǎng)絡(luò)不穩(wěn)定、通信易中斷,陸上節(jié)點(diǎn)易遭受物理攻擊,被安裝竊聽(tīng)設(shè)備以致信息泄露等因素,給密鑰管理方案帶來(lái)極大挑戰(zhàn)[78]。因此,跨域異構(gòu)集群網(wǎng)絡(luò)的密鑰管理方案在保證基礎(chǔ)安全性的前提下,還應(yīng)滿足以下要求:①輕量級(jí)設(shè)計(jì),通信和計(jì)算成本低;②兼容異構(gòu)網(wǎng)絡(luò)節(jié)點(diǎn);③不同域之間能快速融合和切換。
表3 密鑰動(dòng)態(tài)管理方案性能計(jì)較
(2)集群認(rèn)證
在集群網(wǎng)絡(luò)中,網(wǎng)絡(luò)節(jié)點(diǎn)數(shù)量規(guī)模較大,而且節(jié)點(diǎn)之間通過(guò)自主動(dòng)態(tài)組網(wǎng)與協(xié)同,快速完成組網(wǎng),具有動(dòng)態(tài)變化的靈活性,但攻擊者往往會(huì)利用這種高程度的自主協(xié)同進(jìn)行有效攻擊,竊取秘密信息,實(shí)施內(nèi)部攻擊,癱瘓整個(gè)集群網(wǎng)絡(luò)體系,因此需要對(duì)集群網(wǎng)絡(luò)節(jié)點(diǎn)進(jìn)行安全的身份認(rèn)證,提高密鑰管理方案的安全性[79]。集群網(wǎng)絡(luò)認(rèn)證難度較大,需要對(duì)數(shù)量較多的網(wǎng)絡(luò)節(jié)點(diǎn)實(shí)施批量動(dòng)態(tài)認(rèn)證,在不可靠的無(wú)線通信網(wǎng)絡(luò)環(huán)境下進(jìn)行群組加入認(rèn)證,容易導(dǎo)致認(rèn)證失敗,而研究集群身份認(rèn)證對(duì)網(wǎng)絡(luò)安全和密鑰管理具有重要意義[80]。
(3)愈合機(jī)制
集群無(wú)線網(wǎng)絡(luò)不可靠容易出現(xiàn)通信中斷現(xiàn)象,節(jié)點(diǎn)數(shù)量規(guī)模較大且具有高速移動(dòng)特性,部分節(jié)點(diǎn)可能會(huì)出現(xiàn)廣播數(shù)據(jù)包丟失情況,雖然自愈機(jī)制根據(jù)后續(xù)接收到的廣播密鑰更新消息能夠恢復(fù)密鑰,不需要向密鑰分發(fā)中心(KDC)請(qǐng)求重發(fā)廣播消息,一定程度上降低了通信開(kāi)銷,但廣播消息需要包括以前階段的密鑰信息,而且在當(dāng)前會(huì)話階段是無(wú)法恢復(fù)的,只有在后續(xù)收到廣播消息才能進(jìn)行密鑰恢復(fù);而互愈機(jī)制可以借助其他鄰居共享丟失的廣播消息進(jìn)行恢復(fù),提高了實(shí)時(shí)響應(yīng)性,具有重要應(yīng)用價(jià)值[81]。因此,適合不穩(wěn)定無(wú)線網(wǎng)絡(luò)的密鑰愈合管理方案是未來(lái)的重要研究方向[82]。
(4)技術(shù)融合
隨著前沿技術(shù)不斷發(fā)展,集群密鑰管理不再局限于傳統(tǒng)管理策略,而是與相關(guān)技術(shù)融合進(jìn)行密鑰管理,提升安全性和效率,是未來(lái)密鑰管理的研究重點(diǎn)方向。一是結(jié)合人工智能技術(shù)管理,根據(jù)節(jié)點(diǎn)數(shù)量、前期密鑰更新決策和當(dāng)前網(wǎng)絡(luò)安全等級(jí),通過(guò)強(qiáng)化學(xué)習(xí)算法,不斷優(yōu)化密鑰更新頻率和密鑰長(zhǎng)度,獲得密鑰最優(yōu)更新策略,提高密鑰管理的科學(xué)性和智能化[83]。二是結(jié)合區(qū)塊鏈技術(shù)管理,利用區(qū)塊鏈去中心化、不易篡改和可追溯性等特征,設(shè)計(jì)密鑰管理區(qū)塊鏈,并使用智能合約進(jìn)行密鑰協(xié)商,無(wú)須第三方參與,自主分發(fā)和更新密鑰,還可記錄密鑰更新過(guò)程,方便后續(xù)安全性檢查,確保密鑰管理機(jī)密性[84-85]。三是結(jié)合動(dòng)態(tài)分簇技術(shù)管理,引入動(dòng)態(tài)分簇算法,對(duì)網(wǎng)絡(luò)進(jìn)行分層分簇,在節(jié)點(diǎn)加入、簇組合并或分裂等動(dòng)態(tài)變化過(guò)程中,智能選出最佳簇頭進(jìn)行分發(fā),便于動(dòng)態(tài)更新密鑰,延長(zhǎng)網(wǎng)絡(luò)密鑰管理生命周期,增強(qiáng)密鑰管理的靈活性。
隨著信息網(wǎng)絡(luò)普遍應(yīng)用,網(wǎng)絡(luò)攻擊手段不斷演化升級(jí),信息安全成為令人關(guān)注的話題,如何在復(fù)雜集群網(wǎng)絡(luò)環(huán)境下維護(hù)網(wǎng)絡(luò)安全,確保信息安全可靠傳輸,成為社會(huì)關(guān)注的重要安全問(wèn)題,而密鑰管理是信息安全的基石,具有廣闊的應(yīng)用前景。
(1)泛在物聯(lián)安全
隨著5G、物聯(lián)網(wǎng)技術(shù)的快速發(fā)展,泛在物聯(lián)成為未來(lái)發(fā)展趨勢(shì),將現(xiàn)有的互聯(lián)網(wǎng)拓展到物品,構(gòu)建萬(wàn)物互聯(lián)的網(wǎng)絡(luò),實(shí)現(xiàn)對(duì)物的智能化管理和信息收集。大量的異構(gòu)節(jié)點(diǎn)信息連接和交互,形成了復(fù)雜的集群網(wǎng)絡(luò),容易遭受到各類網(wǎng)絡(luò)安全攻擊。而集群密鑰管理給規(guī)模較大網(wǎng)絡(luò)通信安全提供了解決方案,對(duì)網(wǎng)絡(luò)節(jié)點(diǎn)進(jìn)行分層分簇管理,可以完成對(duì)大量節(jié)點(diǎn)進(jìn)行身份認(rèn)證和數(shù)據(jù)加密,維護(hù)泛在物聯(lián)網(wǎng)絡(luò)的通信安全。
(2)全域作戰(zhàn)需求
未來(lái)作戰(zhàn)不再是單一維度作戰(zhàn),而是高度融合陸、海、空、網(wǎng)、天、電等作戰(zhàn)領(lǐng)域,協(xié)同多域作戰(zhàn)力量,開(kāi)展聯(lián)合全域作戰(zhàn)行動(dòng)[86]。完成全域作戰(zhàn)需要強(qiáng)大的空天網(wǎng)絡(luò)支撐和安全的指揮通信鏈路,進(jìn)行跨域傳輸共享戰(zhàn)斗數(shù)據(jù)。考慮到軍事通信安全需求,在全域作戰(zhàn)網(wǎng)絡(luò)體系需要進(jìn)行密鑰管理,對(duì)所傳輸?shù)臄?shù)據(jù)進(jìn)行加密操作,保證軍事秘密安全傳輸,集群網(wǎng)絡(luò)密鑰管理為構(gòu)建全域安全通信鏈路提供了技術(shù)支撐。
(3)智慧城市建設(shè)
智慧城市建設(shè)如火如荼,通過(guò)現(xiàn)代化信息網(wǎng)絡(luò)技術(shù),將社區(qū)、醫(yī)療、交通、政務(wù)、社會(huì)治理等業(yè)務(wù)組成復(fù)雜的城市系統(tǒng),因其節(jié)點(diǎn)繁雜多樣,對(duì)其安全攻擊方法多樣,危害性較大,而且正常運(yùn)行需要對(duì)大量數(shù)據(jù)進(jìn)行匯聚融合,數(shù)據(jù)安全成為突出問(wèn)題。如何解決以“數(shù)據(jù)安全”為核心的智慧城市安全,成為重要研究難題,而密碼技術(shù)作為信息安全的基礎(chǔ)和核心技術(shù),是智慧城市建設(shè)的安全基石,為智慧城市網(wǎng)絡(luò)建立密碼應(yīng)用方案[87],需要解決密碼管理的核心技術(shù)密鑰管理,因此,集群網(wǎng)絡(luò)密鑰管理對(duì)建設(shè)智慧城市具有重要的安全意義。
隨著物聯(lián)網(wǎng)、車聯(lián)網(wǎng)、無(wú)人機(jī)集群技術(shù)快速發(fā)展,集群網(wǎng)絡(luò)安全問(wèn)題日益突出,集群密鑰管理成為研究熱點(diǎn)。本文介紹了集群網(wǎng)絡(luò)的典型模型、特性,并分析了集群密鑰管理的流程步驟和評(píng)價(jià)指標(biāo),根據(jù)網(wǎng)絡(luò)部署前和部署后管理過(guò)程,總結(jié)分析了近年來(lái)有關(guān)的集群密鑰管理方案研究進(jìn)展情況,將其分為預(yù)分配管理、愈合管理、動(dòng)態(tài)管理三類,最后展望了集群密鑰管理的研究熱點(diǎn)和應(yīng)用前景。隨著信息網(wǎng)絡(luò)技術(shù)的飛速發(fā)展,網(wǎng)絡(luò)結(jié)構(gòu)將愈加復(fù)雜,傳統(tǒng)單一模式的密鑰管理不適用于未來(lái)復(fù)雜網(wǎng)絡(luò)場(chǎng)景。集群密鑰管理作為集群網(wǎng)絡(luò)安全的技術(shù)基礎(chǔ)和核心,為復(fù)雜網(wǎng)絡(luò)體系的信息數(shù)據(jù)安全傳輸提供了有效的解決思路。目前,不存在完美的密鑰管理方案,能滿足所有的安全性和成本效率,因此,實(shí)際應(yīng)用中,需要把握適度原則,根據(jù)具體場(chǎng)景設(shè)計(jì)適合密鑰管理方案,提高密鑰管理的實(shí)踐安全性,加快與區(qū)塊鏈、人工智能、量子等技術(shù)融合,使得密鑰管理更加智能化、科學(xué)化、高效化。
[1] GRASSé P. La reconstruction du nid et les coordinations interindividuelles chezBellicositermes natalensis etCubitermes sp. la théorie de la stigmergie: Essai d'interprétation du comportement des termites constructeurs[J]. Insectes Sociaux, 1959, 6(1): 41-80.
[2] 秦小林, 羅剛, 李文博, 等. 集群智能算法綜述[J]. 無(wú)人系統(tǒng)技術(shù), 2021, 4(3): 1-10.
QIN X L, LUO G, LI W B, et al. A review of swarm intelligence algorithms[J]. Unmanned Systems Technology, 2021, 4(3): 1-10.
[3] 劉文婷, 杜春玲, 范修斌, 等. CFL 密鑰管理研究[J]. 信息安全研究, 2016, 2(7): 628-638.
LIU W T, DU C L, FAN X B, et al. Study on the CFL's key management[J]. Journal of Information Security Research, 2016, 2(7): 628-638.
[4] HE X, NIEDERMEIER M, DE MEER H. Dynamic key management in wireless sensor networks: a survey[J]. Journal of Network and Computer Applications, 2013, 36(2): 611-622.
[5] BARSKAR R, CHAWLA M. A survey on efficient group key management schemes in wireless networks[J]. Indian Journal of Science and Technology, 2016, 9(14): 1-16.
[6] SINGH P, GILL N S. A survey on key management schemes in wireless ad hoc networks[J]. International Journal of Applied Engineering Research, 2018, 13(1): 268-272.
[7] YOUSEFPOOR M S, BARATI H. Dynamic key management algorithms in wireless sensor networks: a survey[J]. Computer Communications, 2019, 134: 52-69.
[8] PARTHASARATHI P, SHANKAR S, NIVEDHA S. A survey on dynamic key management system in secure group communication[C]//2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS). 2020: 1440-1443.
[9] NITHYA B. Cluster based key management schemes in wireless sensor networks: a survey[J]. Procedia Computer Science, 2020, 171: 2684-2693.
[10] JAWAD H M, NORDIN R, GHARGHAN S K, et al. Energy-efficient wireless sensor networks for precision agriculture: a review[J]. Sensors, 2017, 17(8): 1781.
[11] ANNAPURNA H S, SIDDAPPA M. A technique for multitier key distribution for securing group communication in WSN[M]// Emerging Research in Computing, Information, Communication and Applications. 2016: 87-94.
[12] WANG W, WEI J, ZHAO S, et al. Energy efficiency resource allocation based on spectrum-power tradeoff in distributed satellite cluster network[J]. Wireless Networks, 2020, 26(6): 4389-4402.
[13] ALI Z A, HAN Z, MASOOD R J. Collective motion and self-organization of a swarm of UAVs: a cluster-based architecture[J]. Sensors, 2021, 21(11): 3820.
[14] SHIDDHARTHY R. A selective reliable communication to reduce broadcasting for cluster based VANET[J]. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021, 12(3): 4450-4457.
[15] ACHROUFENE A, CHELIK M, BOUADEM N. Modified CSMA/CA protocol for real-time data fusion applications based on clustered WSN[J]. Computer Networks, 2021, 196: 108243.
[16] WANG G, KIM S, KANG D, et al. Lightweight key renewals for clustered sensor networks[J]. Journal of Networks, 2010, 5(3): 300-312.
[17] KUMAR V, MALIK N. Enhancing the connectivity and resiliency of random key pre-distribution schemes for wireless sensor network[J]. International Journal of System Assurance Engineering and Management, 2021: 1-8.
[18] BLOM R. An optimal class of symmetric key generation systems[C]//Workshop on the Theory and Application of Cryptographic Techniques, 1984: 335-338.
[19] BLUNDO C, DE SANTIS A, HERZBERG A, et al. Perfectly secure key distribution for dynamic conferences[J]. Information and Computation, 1998, 146(1): 1-23.
[20] ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002: 41-47.
[21] CHAN H, PERRIG A, SONG D. Random key pre-distribution schemes for sensor networks[C]//Proceedings of the 2003 Symposium on Security and Privacy. 2003: 197-213.
[22] DU W, DENG J, HAN Y S, et al. A pairwise key pre-distribution scheme for wireless sensor networks[J]. ACM Transactions on Information and System Security (TISSEC), 2005, 8(2): 228-258.
[23] LIU D, NING P. Location-based pairwise key establishments for static sensor networks[C]//Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. 2003: 72-82.
[24] ZHU S, SETIA S, JAJODIA S. LEAP+ efficient security mechanisms for large-scale distributed sensor networks[J]. ACM Transactions on Sensor Networks (TOSN). 2006, 2(4): 500-528.
[25] 張記, 杜小妮, 李旭, 等. 安全的無(wú)線傳感器網(wǎng)絡(luò)密鑰預(yù)分配方案[J]. 計(jì)算機(jī)應(yīng)用, 2013, 33(7): 1851-1853.
ZHANG J, DU X N, LI X, et al. Secure key pre-distribution scheme for wireless sensor networks[J]. Journal of Computer Applications, 2013, 33(7): 1851-1853.
[26] 賀智明,曹謙. 傳感器網(wǎng)絡(luò)多密鑰空間分層密鑰預(yù)分配方案[J]. 計(jì)算機(jī)應(yīng)用與軟件, 2014, 31(11): 326-329.
HE Z M, CAO Q. A hierarchical key preallocation scheme for mul-tiple key spaces in wireless sensor network[J]. Computer Applications and Software, 2014, 31(11): 326-329.
[27] 趙然, 方承志. 分簇式無(wú)線傳感器網(wǎng)絡(luò)密鑰預(yù)分配方案[J]. 計(jì)算機(jī)工程與設(shè)計(jì), 2016, 37(2): 345-348.
ZHAO R, FANG C Z. Key pre-distribution scheme for clustered wireless sensor network[J]. Computer Engineering and Design, 2016, 37(2): 345-348.
[28] DAI H, XU H. Key pre-distribution approach in wireless sensor networks using LU matrix[J]. IEEE Sensors Journal, 2010, 10(8): 1399-1409.
[29] CHAKAVARIKA T T, GUPTA S K, CHAURASIA B K. Energy efficient key distribution and management scheme in wireless sensor networks[J]. Wireless Personal Communications, 2017, 97(1): 1059-1070.
[30] YI C, AGRAWAL D P. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks[J]. Ad Hoc Networks, 2007, 5(1): 35-48.
[31] KRISHNAPPA V, NARAYANAGOWDA S. A novel technique for improving the security of WSN using random key pre-distribution scheme[J]. International Journal of Intelligent Engineering and Systems, 2019, 12(2): 33-41.
[32] KUMAR A, BANSAL N, PAIS A R. New key pre-distribution scheme based on combinatorial design for wireless sensor networks[J]. IET Communications, 2019, 13(7): 892-897.
[33] 陳虹旭, 李曉坤, 徐龍, 等. 泛在電力物聯(lián)網(wǎng)的多項(xiàng)式密鑰管理算法研究[J]. 智能計(jì)算機(jī)與應(yīng)用, 2020,10(8):140-143.
CHEN H X, LI X K, XU L, et al. Research on polynomial key management algorithm ubiquitous in power internet of things[J]. Intelligent Computer and Applications, 2020,10(8):140-143.
[34] PREMAMAYUDU B, RAO B T, RAO K V, et al. Key pre-distribution protocol for node to node for wireless sensor networks[J]. Annals of the Romanian Society for Cell Biology, 2021, 25(4): 16769-16779.
[35] TIAN B, HAN S, PARVIN S, et al. Self-healing key distribution schemes for wireless networks: a survey[J]. Computer Journal, 2011, 54(4): 549-569.
[36] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
[37] STADDON J, MINER S, FRANKLIN M, et al. Self-healing key distribution with revocation[C]//Proceedings 2002 IEEE Symposium on Security and Privacy. 2002: 241-257.
[38] LIU D, NING P, SUN K. Efficient self-healing group key distribution with revocation capability[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003: 231-240.
[39] SáEZ G. On threshold self-healing key distribution schemes[C]// IMA International Conference on Cryptography and Coding. 2005: 340-354.
[40] TIAN B M, HE M X. A self-healing key distribution scheme with novel properties[J]. International Journal of Network Security, 2008, 7(1): 114-119.
[41] 曹帥,張串絨,宋程遠(yuǎn). 具有抗合謀攻擊能力的自治愈群組密鑰管理方案[J]. 計(jì)算機(jī)應(yīng)用, 2011, 31(10): 2692-2693.
CAO S, ZHANG C R, SONG C Y. A self-healing group key management scheme with collusion resistance[J]. Journal of Computer Applications, 2011, 31(10): 2692-2693.
[42] TIAN B, HAN S, DILLON T S, et al. A self-healing key distribution scheme based on vector space secret sharing and one way hash chains[C]//2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. 2008: 1-6.
[43] GU J, XUE Z. An efficient self-healing key distribution with resistance to the collusion attack for wireless sensor networks[C]// 2010 IEEE International Conference on Communications. 2010: 1-5.
[44] 李林春,李建華,潘軍. 無(wú)線傳感器網(wǎng)絡(luò)中具有撤銷功能的自愈組密鑰管理方案[J]. 通信學(xué)報(bào), 2009, 30(12): 12-17.
LI L C, LI J H, PAN J. Self-healing group key management scheme with revocation capability for wireless sensor networks[J]. Journal on Communications, 2009, 30(12): 12-17.
[45] JIANG Y, LIN C, SHI M, et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks[J]. Ad Hoc Networks, 2007, 5(1): 14-23.
[46] TIAN B, HAN S, DILLON T S. A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks[C]//2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. 2008: 208-215.
[47] RAMS T, PACYNA P. Long-lived self-healing group key distribution scheme with backward secrecy[C]//2013 Conference on Networked Systems. 2013: 59-65.
[48] TIAN B, HAN S, HU J, et al. A mutual-healing key distribution scheme in wireless sensor networks[J]. Journal of Network and Computer Applications, 2011, 34(1): 80-88.
[49] AGRAWAL S, PATEL J, DAS M L. Pairing based mutual healing in wireless sensor networks[C]//2016 8th International Conference on Communication Systems and Networks (COMSNETS). 2016: 1-8.
[50] 李德全, 張習(xí)勇, 張婷婷, 等. 具有私鑰自愈能力的DTN密鑰管理方案[J]. 網(wǎng)絡(luò)與信息安全學(xué)報(bào), 2017, 3(4): 26-31.
LI D Q, ZHANG X Y, ZHANG T T, et al. Key management scheme with private key self-healing ability in DTN[J]. Chinese Journal of Network and Information Security, 2017, 3(4): 26-31.
[51] AGRAWAL S, DAS M L. Mutual healing enabled group-key distribution protocol in wireless sensor networks[J]. Computer Communications, 2017, 112: 131-140.
[52] GUO H, ZHENG Y, LI X, et al. Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications[J]. Future Generation Computer Systems, 2018, 89: 713-721.
[53] TSITAITSE T J, CAI Y, DITTA A. Secure self-healing group key distribution scheme with constant storage for SCADA systems in smart grid[J]. Wireless Personal Communications, 2018, 101(3): 1749-1763.
[54] LI X, WANG Y, VIJAYAKUMAR P, et al. Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network[J]. IEEE Transactions on Vehicular Technology, 2019, 68(11): 11309-11322.
[55] VADLAMUDI C V, VADLAMUDI S P D. A novel self‐healing key distribution scheme based on vector space access structure and MDS codes[J]. International Journal of Communication Systems, 2019, 32(16): 4088-4097.
[56] TENTU A N, PAUL P, VENKAIAH V C. Computationally perfect compartmented secret sharing schemes based on MDS codes[J]. International Journal of Trust Management in Computing and Communications, 2014, 2(4): 353-378.
[57] 代紫夢(mèng), 王方偉, 王長(zhǎng)廣. WSN 中基于指數(shù)算法的互愈組密鑰分配方案[J]. 計(jì)算機(jī)與數(shù)字工程, 2019, 47(1): 180-185.
DAI Z M, WANG F W, WANG C G. Exponential arithmetic based on mutual-healing group key distribution scheme for WSN[J]. Computer and Digital Engineering, 2019, 47(1): 180-185.
[58] CHIEN H. Self-healing group key distribution facilitating source authentication using block codes[J]. Security and Communication Networks, 2021(6).
[59] AYANOGLU E, CHIH-LIN I, GITLIN R D, et al. Diversity coding: Using error control for self-healing in communication networks[C]//IEEE INFOCOM'90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies, 1990: 95-104.
[60] SINGH A, TENTU A N, VENKAIAH V C. A dynamic key management paradigm for secure wireless ad hoc network communications[J]. International Journal of Information and Computer Security, 2021, 14(3-4): 380-402.
[61] YOUNIS M F, GHUMMAN K, ELTOWEISSY M. Location-aware combinatorial key management scheme for clustered sensor networks[J]. IEEE transactions on parallel and distributed systems, 2006, 17(8): 865-882.
[62] ELTOWEISSY M, MOHARRUM M, MUKKAMALA R. Dynamic key management in sensor networks[J]. IEEE Communications magazine, 2006, 44(4): 122-130.
[63] DIVYA R, THIRUMURUGAN T. A novel dynamic key management scheme based on hamming distance for wireless sensor networks[C]//2011 International Conference on Computer, Communication and Electrical Technology (ICCCET). 2011: 181-185.
[64] ZHANG Y, SHEN Y, LEE S. A cluster-based group key management scheme for wireless sensor networks[C]//2010 12th International Asia-Pacific Web Conference. 2010: 386-388.
[65] GUO S, QIAN Z. A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks[J]. Computer Systems Science and Engineering, 2010, 25(6): 315-326.
[66] 關(guān)志濤, 徐月, 伍軍. 傳感器網(wǎng)絡(luò)中基于三元多項(xiàng)式的密鑰管理方案[J]. 通信學(xué)報(bào), 2013, 34(12): 71-78.
GUAN Z T, XU Y, WU J. Ternary polynomial based key management scheme for wireless sensor network[J]. Journal on Communications, 2013, 34(12): 71-78.
[67] CHELLA THEVAR G K, ROHINI G. Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks[J]. Wireless Networks, 2017, 23(5): 1479-1489.
[68] SEO S H, WON J, SULTANA S, et al. Effective key management in dynamic wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2017, 10(2): 371-383.
[69] 梁濛. 一種動(dòng)態(tài)的分簇?zé)o線傳感器網(wǎng)絡(luò)密鑰管理方案[D]. 西安:西安理工大學(xué), 2018.
LIANG M. A dynamic clustering wireless sensor networks key management scheme[D]. Xi 'an: Xi 'an University of Technology, 2018.
[70] ATHMANI S, BILAMI A, BOUBICHE D E. EDAK: an efficient dynamic authentication and key management mechanism for heterogeneous WSNs[J]. Future Generation Computer Systems, 2019, 92: 789-799.
[71] WANG X, YANG Z, FENG Z, et al. A WSN layer-cluster key management scheme based on quadratic polynomial and lagrange interpolation Polynomial[J]. Sensors, 2020, 20(16): 4388.
[72] YOUSEFPOOR M S, BARATI H. DSKMS: A dynamic smart key management system based on fuzzy logic in wireless sensor networks[J]. Wireless Networks. 2020, 26(4): 2515-2535.
[73] DE SILVA C W. Intelligent control: fuzzy logic applications[M]. Boca Raton: CRC press, 2018.
[74] KUMAR V, MALIK N, DHIMAN G, et al. Scalable and storage efficient dynamic key management scheme for wireless sensor network[J]. Wireless Communications and Mobile Computing, 2021: (7).
[75] ARUMUGAM V, SESHASAYANAM A. An adaptive multilevel location based key management system for dynamic wireless sensor networks[J]. International Journal of Applied Science and Engineering. 2021, 18(1): 1-11.
[76] GUO Y, LI Q, LI Y, et al. Service coordination in the Space-Air-Ground integrated network[J]. IEEE Network. 2021, 35(5): 168-173.
[77] 劉夢(mèng)如,付玉龍,曹進(jìn),等. 基于區(qū)塊鏈的天地一體化信息網(wǎng)絡(luò)非交互式密鑰交換方法[J]. 天地一體化信息網(wǎng)絡(luò), 2021, 2(3): 48-56.
LIU M R, FU Y L, CAO J, et al. A non-interactive key exchange scheme for space-integrated-ground information network based on blockchain[J]. Space-Integrated-Ground Information Networks. 2021, 2(3): 48-56.
[78] 張宏俊. 空天一體聯(lián)合體系作戰(zhàn)及其技術(shù)展望[J]. 上海航天, 2021, 38(3): 1-7.
ZHANG H J. Combat and technology prospect of air and space integrated operation system[J]. Aerospace Shanghai, 2021, 38(3): 1-7.
[79] 王云,楊娟,司書劍. 無(wú)人機(jī)集群組網(wǎng)認(rèn)證技術(shù)研究[J]. 數(shù)據(jù)通信. 2020(5):10-14.
WANG Y, YANG J, SI S J. Research on UAV cluster networking authentication technology[J]. Data Communication, 2020(5): 10-14.
[80] XU G, LI X, JIAO L, et al. BAGKD: a batch authentication and group key distribution protocol for VANETS[J]. IEEE Communications Magazine. 2020, 58(7): 35-41.
[81] PATEL N, KUMAR V. An efficient key distribution scheme for WSN with mutual healing capability[J]. Multimedia Tools and Applications, 2022, 81(25): 36735-36749.
[82] FRIMPONG E, RABBANINEJAD R, MICHALAS A. Arrows in a quiver: A secure certificateless group key distribution protocol for drones[C]//Nordic Conference on Secure IT Systems. 2021: 31-48.
[83] 徐堂煒, 張海璐, 劉楚環(huán), 等. 基于強(qiáng)化學(xué)習(xí)的低時(shí)延車聯(lián)網(wǎng)群密鑰分配管理技術(shù)[J]. 網(wǎng)絡(luò)與信息安全學(xué)報(bào), 2020, 6(5): 119-125.
XU T W, ZHANG H L, LIU C H, et al. Reinforcement learning based group key agreement scheme with reduced latency for VANET[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 119-125.
[84] PANDA S S, JENA D, MOHANTA B K, et al. Authentication and key management in distributed IoT using blockchain technology[J]. IEEE Internet of Things Journal, 2021, 8(16): 12947-12954.
[85] TAN Y, LIU J, KATO N. Blockchain-based key management for heterogeneous flying ad hoc network[J]. IEEE Transactions on Industrial Informatics, 2020, 17(11): 7629-7638.
[86] 陳彩輝,缐珊珊. 美軍“聯(lián)合全域作戰(zhàn)(JADO)”概念淺析[J]. 中國(guó)電子科學(xué)研究院學(xué)報(bào), 2020, 15(10): 917-921.
CHEN C H, XIAN S S. An analysis of U. S. armed forces “joint all-domain operation” concept[J]. Journal of China Academy of Electronics and Information Technology, 2020, 15(10): 917-921.
[87] 董貴山, 張遠(yuǎn)云, 劉濤, 等. 智慧城市密碼應(yīng)用解決方案[J]. 信息安全與通信保密, 2020(1): 9-16.
DONG G S, ZHANG Y Y, LIU T, et al. Smart city cryptography application solution[J]. Information Security And Communications Privacy, 2020(1): 9-16.
Survey of key management schemes for cluster networks
LIU Jun, YUAN Lin, FENG Zhishang
Information Engineering University, Zhengzhou 450001, China
With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence. Cluster network is an important part of cluster intelligence, the security of information interaction has attracted much attention, and cluster key management has become a research hotspot in network information security. In recent years, many cluster key management schemes have been proposed, which provide effective solutions for information security interaction of complex cluster network systems. The existing cluster key management schemes were analyzed and summarized, and the future research direction and application scenarios were discussed. The typical three-layer cluster network model was introduced, including the control layer, cluster head layer and node layer. The characteristics of cluster network were summarized, such as large number and scale, dynamic topology change, and hierarchical cluster heterogeneity. According to the key management strategy and cluster networking scenarios, the cluster key management process before and after the network deployment was summarized. The key management evaluation index was analyzed from the aspects of security, efficiency, and flexibility. Then, three key management schemes including pre-distribution management, healing management and dynamic management were discussed. Their basic ideas, advantages and disadvantages were analyzed, and their performance from the aspects of techniques, security, flexibility, and efficiency was compared. Besides, the research hotspots related to cluster key management were prospected from cross-domain heterogeneity, cluster authentication, healing mechanism, and technology fusion. The security function of cluster key management in future application scenarios such as ubiquitous IoT, all-domain operation, and smart city was discussed.
cluster network, key management, information security, cluster authentication, healing mechanism
TP309
A
10.11959/j.issn.2096?109x.2022082
2022?04?06;
2022?11?06
袁霖,fkefss@126.com
國(guó)家自然科學(xué)基金(61902427)
The National Natural Science Foundation of China (61902427)
劉軍, 袁霖, 馮志尚. 集群網(wǎng)絡(luò)密鑰管理方案研究綜述[J]. 網(wǎng)絡(luò)與信息安全學(xué)報(bào), 2022, 8(6): 52-69.
LIU J, YUAN L, FENG Z S. Survey of key management schemes for cluster networks[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
劉軍(1991?),男,湖南邵陽(yáng)人,信息工程大學(xué)碩士生,主要研究方向?yàn)樾畔踩c密碼管理。
袁霖(1981?),男,河南商丘人,博士,信息工程大學(xué)副教授,主要研究方向?yàn)樾畔踩c密碼管理。
馮志尚(1996?),男,河南鄭州人,信息工程大學(xué)碩士生,主要研究方向?yàn)樾畔踩c密碼管理。