A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-Composite

被引:45
作者
Gandino, Filippo [1 ]
Ferrero, Renato [1 ]
Rebaudengo, Maurizio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
关键词
Key management; WSN; random predistribution; MANAGEMENT SCHEME; DEPLOYMENT KNOWLEDGE; SYSTEM; PREDISTRIBUTION; INTRUSION; SECURITY;
D O I
10.1109/TIFS.2016.2601061
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. In this paper, an in-depth analytical study is conducted on the state-of-the-art key distribution schemes based on random predistribution. A new protocol, called q-s-composite, is proposed in order to exploit the best features of random predistribution and to improve it with lower requirements. The main novelties of q-s-composite are represented by the organization of the secret material that allows a storing reduction, by the proposed technique for pairwise key generation, and by the limited number of predistributed keys used in the generation of a pairwise key. A comparative analysis demonstrates that the proposed approach provides a higher level of security than the state-of-the-art schemes.
引用
收藏
页码:34 / 47
页数:14
相关论文
共 34 条
  • [1] [Anonymous], 2002, P 9 ACM C COMPUT COM, DOI DOI 10.1145/586110.586117
  • [2] [Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
  • [3] [Anonymous], FED INF PROC STAND P
  • [4] A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
    Bechkit, Walid
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    Tarokh, Vahid
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (02) : 948 - 959
  • [5] Blom R., 1985, Advances in Cryptology. Proceedings of EUROCRYPT 84 - A Workshop on the Theory and Application of Cryptographic Techniques, P335
  • [6] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [7] Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network
    Dai, Huan
    Zhu, Zhao-min
    Gu, Xiao-Feng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 228 - 234
  • [8] Das A.K., 2012, INT J NETW SECUR, V14, P1