Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network

被引:0
|
作者
Pu, Haoyang [1 ]
Chen, Wen [1 ]
Wang, Hongchao [1 ]
Bao, Shenghong [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
关键词
wireless sensor network; synchronous key distribution; negative database; Channel State Information; data security transmission; GENERATION; SCHEME;
D O I
10.3390/s24196217
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method named NDPCS-KS is proposed in the paper. Firstly, through an initial negotiation process, both ends of the main channels generate the same initial key seeds using the Channel State Information (CSI). Subsequently, negotiation keys and a negative database (NDB) are synchronously generated at the two ends based on the initial key seeds. Then, in a second-negotiation process, the NDB is employed to filter the negotiation keys to obtain the keys for encryption. NDPCS-KS reduced the risk of information leakage, since the keys are not directly transmitted over the network, and the eavesdroppers cannot acquire the initial key seeds because of the physical isolation of their eavesdropping channels and the main channels. Furthermore, due to the NP-hard problem of reversing the NDB, even if an attacker obtains the NDB, deducing the initial key seeds is computationally infeasible. Therefore, it becomes exceedingly difficult for attackers to generate legitimate encryption keys without the NDB or initial key seeds. Moreover, a lightweight anti-replay and identity verification mechanism is designed to deal with replay attacks or forgery attacks. Experimental results show that NDPCS-KS has less time overhead and stronger randomness in key generation compared with other methods, and it can effectively counter replay, forgery, and tampering attacks.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [42] Energy Efficient Based Channel Assignment Game Algorithm for Wireless Sensor Network
    Hao, Xiao-Chen
    Ru, Xiao-Yue
    Li, Xi-Da
    Xin, Min-Jie
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 2749 - 2771
  • [43] Research on inverse simulation of physical training process based on wireless sensor network
    Chu Rouxia
    Chen Xiaodong
    Tao Shifang
    Yang Donghai
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (04)
  • [44] Research on the Method of Sonobuoy Target Location based on Wireless Sensor Network
    Peng, Peng-Fei
    Cui, Hao-Tian
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 744 - 749
  • [45] The Intrusion Detection Method based on Game Theory in Wireless Sensor Network
    Ma, Yizhong
    Cao, Hui
    Ma, Jun
    2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 326 - 331
  • [46] A signal reconstruction method of wireless sensor network based on compressed sensing
    Shiyu Zhu
    Shanxiong Chen
    Xihua Peng
    Hailing Xiong
    Sheng Wu
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [47] key-management scheme based on identity and cluster layer in wireless sensor network
    Li Zheng
    Wei Guoheng
    Wang Ya
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 846 - 849
  • [48] Key Node Identification Based on Overall Network Performance Considering Cascading Failure in Wireless Sensor Network
    Yan, Liwei
    Qian, Xihe
    Hu, Xiang
    Wu, Yanyuan
    Xu, Gang
    2020 THE 5TH INTERNATIONAL CONFERENCE ON CONTROL AND ROBOTICS ENGINEERING (ICCRE 2020), 2020, : 197 - 201
  • [49] A traffic data collection and analysis method based on wireless sensor network
    Huan Wang
    Min Ouyang
    Qingyuan Meng
    Qian Kong
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [50] A signal reconstruction method of wireless sensor network based on compressed sensing
    Zhu, Shiyu
    Chen, Shanxiong
    Peng, Xihua
    Xiong, Hailing
    Wu, Sheng
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)