Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network

被引:0
|
作者
Pu, Haoyang [1 ]
Chen, Wen [1 ]
Wang, Hongchao [1 ]
Bao, Shenghong [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
关键词
wireless sensor network; synchronous key distribution; negative database; Channel State Information; data security transmission; GENERATION; SCHEME;
D O I
10.3390/s24196217
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method named NDPCS-KS is proposed in the paper. Firstly, through an initial negotiation process, both ends of the main channels generate the same initial key seeds using the Channel State Information (CSI). Subsequently, negotiation keys and a negative database (NDB) are synchronously generated at the two ends based on the initial key seeds. Then, in a second-negotiation process, the NDB is employed to filter the negotiation keys to obtain the keys for encryption. NDPCS-KS reduced the risk of information leakage, since the keys are not directly transmitted over the network, and the eavesdroppers cannot acquire the initial key seeds because of the physical isolation of their eavesdropping channels and the main channels. Furthermore, due to the NP-hard problem of reversing the NDB, even if an attacker obtains the NDB, deducing the initial key seeds is computationally infeasible. Therefore, it becomes exceedingly difficult for attackers to generate legitimate encryption keys without the NDB or initial key seeds. Moreover, a lightweight anti-replay and identity verification mechanism is designed to deal with replay attacks or forgery attacks. Experimental results show that NDPCS-KS has less time overhead and stronger randomness in key generation compared with other methods, and it can effectively counter replay, forgery, and tampering attacks.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] Secure Key Management Protocol for Wireless Sensor Network Based on Dynamic Cluster
    Huang, Xinyang
    Yang, Ming
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [32] Bridge Safety Warning Method Based on Wireless Sensor Network
    Zhang, Luyao
    2017 2ND AASRI INTERNATIONAL CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (IEA 2017), 2017, : 36 - 41
  • [33] LKH++ Based Group Key Management Scheme for Wireless Sensor Network
    Wenbin Yao
    Si Han
    Xiaoyong Li
    Wireless Personal Communications, 2015, 83 : 3057 - 3073
  • [34] WIRELESS SENSOR NETWORK ENERGY EFFICIENT COVERAGE METHOD BASED ON INTELLIGENT OPTIMIZATION ALGORITHM
    Chen, Yang
    Xu, Xiaoguang
    Wang, Yong
    DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2019, 12 (4-5): : 887 - 900
  • [35] Elevator speed control method based on wireless sensor network
    Zhang, Xu-Tao
    Zhang, Jian-Hua
    Hui, Ying
    Dou, Cheng-Long
    JOURNAL OF ENGINEERING-JOE, 2019, 2019 (22): : 8400 - 8403
  • [36] Energy Efficient Based Channel Assignment Game Algorithm for Wireless Sensor Network
    Xiao-Chen Hao
    Xiao-Yue Ru
    Xi-Da Li
    Min-Jie Xin
    Wireless Personal Communications, 2015, 85 : 2749 - 2771
  • [37] Channel allocation game algorithm based on lifetime model in wireless sensor network
    Hao Xiao-Chen
    Yao Ning
    Ru Xiao-Yue
    Liu Wei-Jing
    Xin Min-Jie
    ACTA PHYSICA SINICA, 2015, 64 (14)
  • [38] Communication Channel Reconstruction Based on Wireless Sensor Network for Pilot Differential Protection
    Pan, Wei
    Chen, Xu
    Xu, Ligiang
    Yin, Xianggen
    Yu, Bin
    2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 2554 - 2560
  • [39] An evolutionary based topological optimization strategy for consensus based clock synchronization protocols in wireless sensor network
    Panigrahi, Niranjan
    Khilar, Pabitra Mohan
    SWARM AND EVOLUTIONARY COMPUTATION, 2015, 22 : 66 - 85
  • [40] An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks
    Kim, Jin Myoung
    Lee, Hae Young
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06) : 2518 - 2533