RANDOM KEY PRE-DISTRIBUTION SCHEME BASED ON KEY UPDATING

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

4
Reader(s)
9
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 9 , ISSUE 2 (June 2016) > List of articles

RANDOM KEY PRE-DISTRIBUTION SCHEME BASED ON KEY UPDATING

ZHU Ling-Zhi * / HE Rui / ZHANG Jun-Ling

Keywords : wireless sensor networks; code slices; pre-distribution; key updating, one-way hash function.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 9, Issue 2, Pages 979-996, DOI: https://doi.org/10.21307/ijssis-2017-904

License : (CC BY-NC-ND 4.0)

Received Date : 21-January-2016 / Accepted: 10-April-2016 / Published Online: 01-June-2016

ARTICLE

ABSTRACT

A random key pre-distribution scheme based on key updating (RKKU) was proposed, which is effective in wireless sensor networks. Firstly, the base station will randomly distribute some keys, a hash function and some code slices to each node. Furthermore, the RKKU scheme compares with the information of some random key to find the same key, and computes the communication key between two sensor nodes with one-way hash function. Since the one-way hash function can ensure that the attacker cannot use the obtained communication key to decipher the source key, it affects only two nodes communicate with each other. To assure the communication security, the key updating was designed based on code segment. The analysis shows that the proposed scheme can meet the security requirement of key management, and it also has less computation cost and storage cost than the existing schemes.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] Eschenauer, L., & Gligor, V. D, “A Key-Management Scheme for Distributed Sensor
Networks”, Proceedings of the 9th ACM conference on Computer and communications
security, 2002, pp.41-47.
[2] Chen G, Wang G J, “Random key pre-distribution scheme based on secure connectivity
detection”, Computer Engineering & Applications, Vol.45, No.6, 2009, pp.109-111.
[3] Chan H, Perrig A, & Song D, “Random key pre-distribution schemes for sensor networks”,
Security and Privacy, Proceedings of 2003 Symposium on IEEE, Vol.98, 2003, pp.197-213.
[4] AKYILDIZIF,SUW,SANKARA SUBRAMAN IAM Y,et al. “A survey on sensor
networks”, IEEE Communications Magazine, Vol.40, No.8, 2002, pp. 102-114.
[5] Chan H W, Adrian P,Song ` D. “Random Key Pre-distribution Scheme for Sensor
Networks”, 2003 IEEE Symposium on Research in Security and Privacy,2003, pp. 197-213.
[6] Huang D, Mehta M, Van d L A, et al. “Modeling Pairwise Key Establishment for Random
Key Predistribution in Large-Scale Sensor Networks”, IEEE/ACM Transactions on
Networking, Vol.15, No.5, 2007, pp. 1204-1215.
[7] Blom R. “An Optimal Class of Symmetric Key Generation Systems”, Lecture Notes in
Computer Science, Vol.209, No.2, 1984, pp. 335-338.
[8] Du W, Deng J, Han Y S, et al. “A Pair Wise Key Pre-Distribution Scheme for Wireless
Sensor Networks”, International Journal of Innovative Technology & Exploring
Engineering, Vol.8, No.2, 2003, pp. 42-51.
[9] Blundo C, Santis A D, Herzberg A, et al. Perfectly-Secure Key Distribution for Dynamic
Conferences [J]. Information & Computation, Vol.146, No.1, 1996, pp. 1-23.
[10] Liu D, Ning P, Li R. “Establishing pairwise keys in distributed sensor networks”, ACM
Transactions on Information & System Security, Vol.8, No.1, 2005, pp. 41-77.
[11] Younis M, Ghumman K, Eltoweissy M. “Location-Aware Combinatorial Key Management
Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel & Distributed
Systems, Vol.17, No.8, 2006, pp. 865-882.
[12] Eltoweissy M, Moharrum M, Mukkamala R. “Dynamic key management in sensor
networks”. IEEE Communications Magazine, Vol.44, No.4, 2006, pp. 122-130.
[13] Dolev D, Yao A C. “On the Security of Public Key Protocol”, IEEE Transactions on
Information Theory, Vol.29, No.2, 1983, pp. 198-208.
[14] Xu J, Qian H, Ying W, et al. “A deployment algorithm for mobile wireless sensor networks
based on the electrostatic field theory”, The International Journal on Smart Sensing and
Intelligent Systems, Vol.8, No.1, 2015, pp. 516-537.
[15] Bai, Q., & Jin, C, “Image fusion and recognition based on compressed sensing
theory”, International Journal on Smart Sensing & Intelligent Systems, Vol.8, No.1, 2015,
pp. 159-180.
[16] Qiao J, Liu S, Qi X, et al, “Transmission power control in wireless sensor networks under
the minimum connected average node degree constraint”, The International Journal on
Smart Sensing and Intelligent Systems, Vol.8, No. 1, 2015, pp.801-821.

EXTRA FILES

COMMENTS