Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network

被引:0
|
作者
Pu, Haoyang [1 ]
Chen, Wen [1 ]
Wang, Hongchao [1 ]
Bao, Shenghong [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
关键词
wireless sensor network; synchronous key distribution; negative database; Channel State Information; data security transmission; GENERATION; SCHEME;
D O I
10.3390/s24196217
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method named NDPCS-KS is proposed in the paper. Firstly, through an initial negotiation process, both ends of the main channels generate the same initial key seeds using the Channel State Information (CSI). Subsequently, negotiation keys and a negative database (NDB) are synchronously generated at the two ends based on the initial key seeds. Then, in a second-negotiation process, the NDB is employed to filter the negotiation keys to obtain the keys for encryption. NDPCS-KS reduced the risk of information leakage, since the keys are not directly transmitted over the network, and the eavesdroppers cannot acquire the initial key seeds because of the physical isolation of their eavesdropping channels and the main channels. Furthermore, due to the NP-hard problem of reversing the NDB, even if an attacker obtains the NDB, deducing the initial key seeds is computationally infeasible. Therefore, it becomes exceedingly difficult for attackers to generate legitimate encryption keys without the NDB or initial key seeds. Moreover, a lightweight anti-replay and identity verification mechanism is designed to deal with replay attacks or forgery attacks. Experimental results show that NDPCS-KS has less time overhead and stronger randomness in key generation compared with other methods, and it can effectively counter replay, forgery, and tampering attacks.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] Public-key based security scheme for wireless sensor network
    Chen, Jiann-Liang
    Lai, Yin-Fu
    Lu, Hsi-Feng
    Kuo, Quan-Cheng
    2008 IEEE RADIO AND WIRELESS SYMPOSIUM, VOLS 1 AND 2, 2008, : 255 - 258
  • [22] Channel-Based Collaborative Authentication Scheme for Wireless Sensor Network
    Han, Guangming
    Jiang, Ting
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2018, 423 : 275 - 284
  • [23] Research on State Detection Method of Electrical Equipment Based on Wireless Sensor Network Signal Processing
    Liang, Chunhui
    Ding, Chao
    Li, Jinfa
    Zuo, Xiaoyang
    TRAITEMENT DU SIGNAL, 2022, 39 (06) : 2237 - 2245
  • [24] A Novel Time Synchronization Algorithm based on the Synchronizer on Wireless Sensor Network with Clustering Architecture
    Tian, Jun-feng
    Wen, Huai-xiang
    MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3, 2011, 467-469 : 217 - 221
  • [25] A NLOS Selection based Localization Method for Wireless Sensor Network
    Cheng, Long
    Qi, Qianyue
    Wu, Xuehan
    Shao, Yuchao
    Wang, Yan
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 340 - 343
  • [26] Medium Access Control for a Tree-Based Wireless Sensor Network: Synchronization Management
    Chalhoub, Gerard
    Guitton, Alexandre
    Jacquet, Frederique
    Freitas, Antonio
    Misson, Michel
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 55 - 59
  • [27] A delaunay triangulation based method for wireless sensor network deployment
    Wu, Chun-Hslen
    Lee, Kuo-Chuan
    Chung, Yeh-Ching
    COMPUTER COMMUNICATIONS, 2007, 30 (14-15) : 2744 - 2752
  • [28] A Sound Source Location Method Based on Wireless Sensor Network
    Ming, Jiang
    Liu Xiaowei
    Sang Shengtian
    Wang Sida
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 1314 - 1317
  • [29] A Wireless Sensor Network Topology Control Method Based on Hypergraph
    Shao, Heng
    Kong, Ruoshan
    Hu, Jicheng
    Zhu, Li
    Mao, Huaqing
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (07): : 297 - 305
  • [30] Self-Correcting Time Synchronization Based on Cross Layer for Wireless Sensor Network
    Liang, Fengmei
    Liu, Bin
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 1871 - 1876