Multiple Hash Key Pre-distribution Scheme Based on Adjacent Deployment Sensor Networks

被引:0
作者
Wen Jian [1 ]
Peng Ya-Li [2 ]
Huang Wen-Wen [1 ]
Yu Min [1 ]
机构
[1] Jiangxi Normal Univ, Dept Comp S&T, Nanchang 330022, Jiangxi, Peoples R China
[2] Jiangxi Normal Univ, Dept Software, Nanchang 330022, Jiangxi, Peoples R China
来源
2008 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-11 | 2008年
关键词
Wireless Sensor Network; Key Pre-distribution; 3-Dismension Grid; Adjacent Deployment; Multiple Hash Algorithm;
D O I
10.1109/CCDC.2008.4597931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is vital to determine whether sensor networks ran be fully developed or not, and key management is the most vital for network security. It is very important to establish pairwise key between any two sensors for the secure communication. A new key pre-distribution scheme (MHBAD) integrating 3-dismension grid model in adjacent deployment strategy with multiple hash algorithm is proposed. Compared with other schemes, simulation results show that the MHBAD scheme, which not only has the advantages of high security performance and low overhead, but also can substantially improve network connectivity, is very suitable for wireless sensor networks in which the nodes are resource-constrained and the network topology changes highly.
引用
收藏
页码:3256 / +
页数:2
相关论文
共 8 条
  • [1] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [2] Perfectly secure key distribution for dynamic conferences
    Blundo, C
    De Santis, A
    [J]. INFORMATION AND COMPUTATION, 1998, 146 (01) : 1 - 23
  • [3] CARMAN DW, 2000, 00010 NAI LAB
  • [4] [崔莉 Cui Li], 2005, [计算机研究与发展, Journal of Computer Research and Development], V42, P163, DOI 10.1360/crad20050121
  • [5] Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
  • [6] LEIGHTON T, 1993, P 13 ANN INT CRYPT C
  • [7] LIU D, 2003, P 10 ACM C COMP COMM, P52
  • [8] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57