Triangle-based key management scheme for wireless sensor networks
Hangyang DAI, Hongbing XU
Triangle-based key management scheme for wireless sensor networks
For security services in wireless sensor networks, key management is a fundamental building block. In this article, we propose a triangle-based key predistribution approach and show that it can improve the effectiveness of key management in wireless sensor networks. This is achieved by using the bivariate polynomial in a triangle deployment system based on deployment information about expected locations of the sensor nodes. The analysis indicates that this scheme can achieve higher probability of both direct key establishment and indirect key establishment. On the other hand, the security analysis shows that its security against node capture would increase with a decrease of the sensor node deployment density and size of the deployment model and an increase of the polynomial degree.
wireless sensor networks / security / key management / triangle
[1] |
Akyildiz I F, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. IEEE Communications Magazine, 2002, 40(8): 102-114
CrossRef
Google scholar
|
[2] |
Dai H Y, Xu H B. Overview of security in wireless sensor networks (WSN). Application Research of Computers, 2006, 23(7): 12-17 (in Chinese)
|
[3] |
Eschenauer L, Gligor V D. A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002, 41-47
|
[4] |
Spencer J. The Strange Logic of Random Graphs. Algorithms and Combinatorics 22. Berlin: Springer, 2000
|
[5] |
DeGroot M H, Schervish M J. Probability and Statistics. 3rd ed. New Jersey: Addison Wesley, 2001
|
[6] |
Chan H W, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proceedings of 2003 IEEE Symposium on Security and Privacy. 2003, 197-213
|
[7] |
Liu D G, Ning P. Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Compute and Communications Security. New York: ACM, 2003, 52-61
|
[8] |
Liu D G, Ning P. Location-based pairwise key establishments for static sensor networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM, 2003, 72-82
|
[9] |
Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly secure key distribution for dynamic conferences. In: Proceedings of Cryptology-CRYPTO’92. Berlin: Springer, 1992, 471-486
|
/
〈 | 〉 |