An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks

被引:7
作者
Cheng, Yuan [1 ]
Liu, Yanan [1 ]
Zhang, Zheng [1 ]
Li, Yanxiu [1 ]
机构
[1] Jinling Inst Technol, Sch Network Secur, Nanjing 211100, Peoples R China
关键词
WSN; security; key distribution; cryptography; AUTHENTICATION SCHEME; MANAGEMENT SCHEME; SECURITY; CRYPTOGRAPHY;
D O I
10.3390/s23146460
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication load is crucial for wireless sensor networks. To address the above objectives, we propose a new key distribution scheme based on an ECC asymmetric encryption algorithm. The two-way authentication mechanism in the proposed scheme not only prevents illegal nodes from accessing the network, but also prevents fake base stations from communicating with the nodes. The complete key distribution and key update methods ensure the security of session keys in both static and dynamic environments. The new key distribution scheme provides a significant performance improvement compared to the classical key distribution schemes for wireless sensor networks without sacrificing reliability. Simulation results show that the proposed new scheme reduces the communication load and key storage capacity, has significant advantages in terms of secure connectivity and attack resistance, and is fully applicable to wireless sensor networks.
引用
收藏
页数:15
相关论文
共 42 条
  • [1] Abu-Mahfouz A.M., 2012, P INT C WIR NETW ICW, P126
  • [2] Sensor data cryptography in wireless sensor networks
    Aysal, Tuncer Can
    Barner, Kenneth E.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) : 273 - 289
  • [3] Boujelben M., 2009, P 3 INT C SENS TECHN, P18
  • [4] Carman D., 2000, CONSTRAINTS APPROACH, P1
  • [5] A survey of key distribution in wireless sensor networks
    Chen, Chi-Yuan
    Chao, Han-Chieh
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2495 - 2508
  • [6] Dludla A.G., 2013, P 2013 IEEE 1 AFRICA, P1
  • [7] An effective key management scheme for heterogeneous sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hslao-Hwa
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 24 - 34
  • [8] A dynamic key management scheme for dynamic wireless sensor networks
    Erfani, Seyed Hossein
    Javadi, Hamid H. S.
    Rahmani, Amir Masoud
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1040 - 1049
  • [9] Eschenauer L, 2012, P 9 ACM C COMP COMM, P41, DOI DOI 10.1145/586110.586117
  • [10] A key management scheme using (p, q)-lucas polynomials in wireless sensor network
    Gautam, Amit Kumar
    Kumar, Rakesh
    [J]. CHINA COMMUNICATIONS, 2021, 18 (11) : 210 - 228