Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network

被引:0
|
作者
Pu, Haoyang [1 ]
Chen, Wen [1 ]
Wang, Hongchao [1 ]
Bao, Shenghong [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
关键词
wireless sensor network; synchronous key distribution; negative database; Channel State Information; data security transmission; GENERATION; SCHEME;
D O I
10.3390/s24196217
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method named NDPCS-KS is proposed in the paper. Firstly, through an initial negotiation process, both ends of the main channels generate the same initial key seeds using the Channel State Information (CSI). Subsequently, negotiation keys and a negative database (NDB) are synchronously generated at the two ends based on the initial key seeds. Then, in a second-negotiation process, the NDB is employed to filter the negotiation keys to obtain the keys for encryption. NDPCS-KS reduced the risk of information leakage, since the keys are not directly transmitted over the network, and the eavesdroppers cannot acquire the initial key seeds because of the physical isolation of their eavesdropping channels and the main channels. Furthermore, due to the NP-hard problem of reversing the NDB, even if an attacker obtains the NDB, deducing the initial key seeds is computationally infeasible. Therefore, it becomes exceedingly difficult for attackers to generate legitimate encryption keys without the NDB or initial key seeds. Moreover, a lightweight anti-replay and identity verification mechanism is designed to deal with replay attacks or forgery attacks. Experimental results show that NDPCS-KS has less time overhead and stronger randomness in key generation compared with other methods, and it can effectively counter replay, forgery, and tampering attacks.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] A wireless sensor network framework based on light databases
    Canete, Eduardo
    Diaz, Manuel
    Rubio, Bartolome
    SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (05) : 501 - 523
  • [2] Time Synchronization for Wireless Sensor Network Based on Major Clock
    Wang, Na
    Pang, YanXia
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 295 - 298
  • [3] Adaptive temperature compensation time synchronization method for wireless sensor network
    Sun Y.
    Yu J.
    Wang X.
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2019, 40 (01): : 132 - 141
  • [4] A Consensus-based Distributed Clock Synchronization for Wireless Sensor Network
    Zhu, Lin
    Shi, Shuo
    Gu, Xuemai
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 828 - 832
  • [5] Hypercube-based Key Management in Wireless Sensor Network
    Zhao Huawei
    Liu Ruixia
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3386 - +
  • [6] Security key distribution method of wireless sensor network based on DV-hop algorithm
    Fei, Gao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (01) : 66 - 83
  • [7] Mobile Application based on Wireless Sensor Network for Physical Rehabilitation
    Frango, Pedro Martim V. L.
    Postolache, Octavian Adrian
    2018 INTERNATIONAL SYMPOSIUM IN SENSING AND INSTRUMENTATION IN IOT ERA (ISSI), 2018,
  • [8] Cluster based Routing Method in a Wireless Sensor Network
    Kim, EunHwa
    2015 8TH INTERNATIONAL CONFERENCE ON GRID AND DISTRIBUTED COMPUTING (GDC), 2015, : 13 - 16
  • [9] Key-insulated encryption based group key management for wireless sensor network
    Wei-dong Qiu
    Yao-wei Zhou
    Bo Zhu
    Yan-fei Zheng
    Zheng Gong
    Journal of Central South University, 2013, 20 : 1277 - 1284
  • [10] Key-insulated encryption based group key management for wireless sensor network
    邱卫东
    周耀伟
    朱博
    郑燕飞
    龚征
    Journal of Central South University, 2013, 20 (05) : 1277 - 1284