Efficient ID-Based threshold random key pre-distribution scheme for wireless sensor networks

被引:2
作者
Dai, Tran Thanh [1 ]
Hong, Choong Seon [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Sch Elect & Informat, Networking Lab, Yongin 449701, Gyeonggi, South Korea
关键词
ID-based; random key pre-distribution; kev agreement; threshold; security; wireless sensor networks;
D O I
10.1093/ietcom/e91-b.8.2602
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security for wireless sensor networks (WSNs) has become an increasingly serious concern due to the requirement level of applications and hostile deployment areas. To enable secure services, cryptographic keys must be agreed upon by communicating nodes. Unfortunately, due to resource constraints. the key agreement problem in wireless sensor networks has become quite complicated. To tackle this problem, many public-key unrelated proposals which are considered more reasonable in cost than public key based approaches have been proposed so far including random based key pre-distribution schemes. One prominent branch of these proposals is threshold random key pre-distribution schemes. However these schemes still introduce either communication overhead or both communication and computational overheads to resource constrained sensor nodes. Considering this issue. we propose an efficient ID-based threshold random key pre-distribution scheme that not only retains all the highly desirable proper-ties of the schemes including high probability of establishing pairwise keys, tolerance of node compromise but also significantly reduces communication and computational costs of each node. The proposed scheme is validated by a thorough analysis in terms of network resiliency and related overheads. In addition, we also propose a supplementary method to significantly improve the security of pairwise keys established indirectly.
引用
收藏
页码:2602 / 2609
页数:8
相关论文
共 12 条
[1]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[2]  
Blundo C., 1993, LNCS, V740, P471
[3]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[4]  
Chan SP, 2005, GLOB TELECOMM CONF, P1007
[5]  
Dai TT, 2006, LECT NOTES COMPUT SC, V4208, P260
[6]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[7]  
Du WL, 2004, IEEE INFOCOM SER, P586
[8]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[9]  
LIU D, 2005, ACM T INFORM SYSTEM, V8, P41, DOI DOI 10.1145/1053283
[10]  
MATSUMOTO T, 1988, LECT NOTES COMPUT SC, V293, P185