A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks

被引:0
作者
Huang Jie [1 ]
Ou Guohua [1 ]
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Wireless sensor networks; Random key pre-distribution; Asymmetric cryptographic algorithm; Public-key generated method; Communication overhead; Connectivity; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are often deployed in no man's land or hostile environments, therefore, exchange messages between sensors must be encrypted by symmetric key to protect sensitive data. Due to low cost, symmetric key-based key pre-distribution schemes are considered very suitable for wireless sensor networks, but they cannot thoroughly solve authentication and resilience problems against physical capture. In this paper, based on the asymmetric cryptographic algorithms and the characteristics of wireless sensor networks, we propose a public key polynomial-based key pre-distribution scheme for large-scale wireless sensor networks. Our scheme can ensure that any of the two neighbor sensors can establish a unique secure communication link. Compared with other existing schemes, our scheme can provide sufficient security regardless of the number of compromised sensors. Owing to our scheme's lowest storage overhead and perfectly connectivity, it is preferable to large-scale wireless sensor networks.
引用
收藏
页码:45 / 64
页数:20
相关论文
共 25 条
[1]   PRIMES is in P [J].
Agrawal, M ;
Kayal, N ;
Saxena, N .
ANNALS OF MATHEMATICS, 2004, 160 (02) :781-793
[2]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[3]  
Bernstein DJ, 2006, MATH COMPUT, V76, P389
[4]  
Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
[5]  
BONEH D., 2002, CRYPTOBYTES, V5, P1
[6]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[7]  
Cheng Y., 2005, P 2 IEEE INT C MOB A
[8]   An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J].
Cheng, Yi ;
Agrawal, Dharma P. .
AD HOC NETWORKS, 2007, 5 (01) :35-48
[9]  
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[10]  
DU W, 2005, P 6 ACM INT S MOB AD, P58