Using Bivariate Polynomial to Design a Dynamic Key Management Scheme for Wireless Sensor Networks

被引:7
作者
Chen, Chin-Ling [1 ]
Tsai, Yu-Ting [1 ]
Castiglione, Aniello [2 ]
Palmieri, Francesco [3 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, SA, Italy
[3] Univ Naples 2, Dept Ind & Informat Engn, I-81031 Aversa, CE, Italy
关键词
Sensor Networks; Key Management; Authentication; Bivariate Polynomial Key Distribution; LOCALIZATION;
D O I
10.2298/CSIS120907025C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSN) have become increasingly popular in monitoring environments such as: disaster relief operations, seismic data collection, monitoring wildlife and military intelligence. The sensor typically consists of small, inexpensive, battery-powered sensing devices fitted with wireless transmitters, which can be spatially scattered to form an ad hoc hierarchically structured network. Recently, the global positioning system (GPS) facilities were embedded into the sensor node architecture to identify its location within the operating environment. This mechanism may be exploited to extend the WSN's applications. To face with the security requirements and challenges in hierarchical WSNs, we propose a dynamic location-aware key management scheme based on the bivariate polynomial key pre-distribution, where the aggregation cluster nodes can easily find their best routing path to the base station, by containing the energy consumption, storage and computation demands in both the cluster nodes and the sensor nodes. This scheme is robust from the security point of view and able to work efficiently, despite the highly constrained nature of sensor nodes.
引用
收藏
页码:589 / 609
页数:21
相关论文
共 12 条
[1]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[2]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[3]   An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J].
Cheng, Yi ;
Agrawal, Dharma P. .
AD HOC NETWORKS, 2007, 5 (01) :35-48
[4]  
Chin-Ling Chen, 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P576, DOI 10.1109/IMIS.2012.55
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   An Application-Oriented Framework for Wireless Sensor Network Key Establishment [J].
Martin, Keith M. ;
Paterson, Maura .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 192 (02) :31-41
[7]  
Palmieri F., 2011, 2011 International Conference on Broadband, Wireless Computing, Communication and Applications, P374, DOI 10.1109/BWCCA.2011.66
[8]   An Improved Node Localization Algorithm Based on DV-Hop for Wireless Sensor Networks [J].
Qian, Qingji ;
Shen, Xuanjing ;
Chen, Haipeng .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) :953-972
[9]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[10]   Pair-wise path key establishment in wireless sensor networks [J].
Sheu, Jang-Ping ;
Cheng, Jui-Che .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2365-2374